Self-hosting is the security model. Your donor data never leaves your institution's controlled infrastructure. RBAC-first access control, encrypted credentials, signed webhooks, and governance attestation gates throughout.
The reference architecture uses Caddy as a reverse proxy for automatic SSL, Cloudflared for secure tunnel access without exposing ports, and a dedicated ops cron runner isolated from web traffic.
RBAC enforced at the tRPC API layer. Legacy membership fallback for transition periods. Session-based database switching for EvaNeT operators only.
We're happy to provide a full security architecture review with your institution's IT and data governance teams as part of the discovery process.