Introduction to Security
Learn about Sarah's security measures and how to protect your information and that of your customers.
Last updated: 2025-01-26
Security is fundamental in Sarah. This guide explains the security measures implemented and how you can protect your information and that of your customers.
Security Principles
Data Protection
Sarah implements multiple security layers to protect:
- Customer data: Personal and contact information
- Financial data: Payment and transaction information
- Commercial data: Inventory, sales, reports
- Credentials: Users, passwords, tokens
Compliance
Sarah complies with security standards:
- Encryption: Data encrypted in transit and at rest
- Authentication: Robust authentication system
- Authorization: Role-based access control
- Audit: Logging of important activities
Security Features
Authentication
- Strong passwords: Complexity requirements
- Two-factor authentication (2FA): Optional but recommended
- Secure sessions: Encrypted session tokens
- Session timeout: Automatic after inactivity
Authorization
- Roles and permissions: Granular access control
- Per-company access: Each user only sees their company
- Specific permissions: Control over what each user can do
Encryption
- Data in transit: HTTPS/TLS for all communications
- Data at rest: Encryption of sensitive data
- Credentials: Encrypted passwords and tokens
Audit
- Activity logging: Logs of important actions
- Traceability: Who did what and when
- Monitoring: Detection of suspicious activities
Roles and Permissions
Administrator (Role ID: 1)
Full system access:
- ✅ Company configuration
- ✅ User management
- ✅ Access to all modules
- ✅ Billing and reports
- ✅ Integration configuration
Cashier (Role ID: 2)
Focused on cash operations:
- ✅ Point of sale (POS)
- ✅ Cash registers and shifts
- ✅ Basic sales
- ❌ Configuration
- ❌ User management
Salesperson (Role ID: 3)
Focused on sales:
- ✅ Point of sale (POS)
- ✅ Customer management
- ✅ Sales
- ❌ Cash registers and shifts
- ❌ Configuration
Best Practices
For Administrators
- ✅ Use strong passwords: Minimum 12 characters, mix of uppercase, lowercase, numbers, and symbols
- ✅ Enable 2FA: Two-factor authentication when available
- ✅ Review users regularly: Remove users who no longer need access
- ✅ Assign appropriate roles: Don't give administrator permissions unnecessarily
- ✅ Monitor activities: Review logs regularly
For Users
- ✅ Don't share credentials: Each user must have their own account
- ✅ Log out: Log out when finished, especially on shared computers
- ✅ Report problems: If you notice something suspicious, report it immediately
- ✅ Update passwords: Change passwords periodically
For the Company
- ✅ Password policy: Establish a clear policy
- ✅ Training: Train your team on security
- ✅ Regular review: Review users and permissions regularly
- ✅ Backup: Ensure you have regular backups
Data Protection
Customer Data
- Personal information: Stored securely
- Contact data: Protected and only accessible by authorized users
- Purchase history: Only visible to users with permissions
Financial Data
- Payment information: Card data is not stored
- Transactions: Processed securely
- MercadoPago integration: MercadoPago handles all sensitive information
Commercial Data
- Inventory: Protected and only accessible by authorized users
- Sales: Complete history with traceability
- Reports: Only authorized users can view reports
Secure Integrations
MercadoPago
- Encrypted credentials: Tokens stored securely
- Secure communication: All communications are HTTPS
- No card data: MercadoPago handles all sensitive information
Correo Argentino
- Encrypted credentials: Username and password stored securely
- Secure communication: API calls are HTTPS
- Validation: Credentials validated before use
AFIP/ARCA
- Secure certificates: Digital certificates for authentication
- Encrypted communication: All communications are secure
- Traceability: All operations are recorded
Security Incidents
If You Suspect a Problem
- Change passwords: Change all passwords immediately
- Review users: Verify there are no unauthorized users
- Review activities: Review recent activity logs
- Contact support: Contact Sarah support immediately
Prevention
- ✅ Monitor regularly: Review users and activities
- ✅ Train team: Ensure everyone understands security
- ✅ Update regularly: Keep system updated
- ✅ Use best practices: Follow security best practices
Next Steps
- Roles and Permissions - Learn about roles and permissions
- Authentication and Access - Configure authentication