Private household records
Wholekin
Why households can trust us with sensitive records.
Wholekin is built for private household operations, where trust is part of the product itself. Our controls reflect the standards serious customers expect in ISO 27001 and SOC 2 style reviews, with clear attention to access control, protected infrastructure, secure authentication, disciplined change management, and data handling.
Current controls
High-level controls behind the current implementation
These are the control areas that matter most when evaluating whether a product can responsibly hold private household data.
Public traffic is served exclusively over HTTPS.
Certificates are managed through AWS Certificate Manager for the public application surface.
Application secrets are managed through AWS Secrets Manager.
Storage resources in the stack are configured with encryption and blocked public access by default.
Authentication is delegated to Auth0.
The backend validates issuer, audience, and signing material before accepting tokens.
Session cookies are signed, HttpOnly, and marked Secure in production.
Refresh handling remains inside the SSR session flow and follows modern browser security practices.
Authorization decisions are backed by Cedar.
Policies and schema are validated at startup so broken authorization definitions fail before serving requests.
Permissions are expressed explicitly for create, list, read, update, and delete operations.
Critical business safeguards still sit behind service-level protections, including owner-protection rules.
Core entity operations rely on validated request models.
Domain-specific validators protect important record rules such as relationship structure and phone formatting.
Frontend changes must pass formatting, typing, linting, and build checks in CI.
The primary database is not publicly exposed and runs in private isolated subnets.
Database credentials are generated and stored in managed secret storage.
Operational logging and container visibility are enabled for the running environment.
Backups and database log export are part of the deployed stack.
Frontend CI requires formatting, typechecking, linting, and a production build.
Backend CI runs formatting, static analysis, tests, and strict compilation checks.
Container repositories are configured for image scanning on push.
Static analysis is built into the backend delivery pipeline.
Cedar gives us a rigorous foundation for secure identity and access management. That matters in a household system where principals, relatives, staff, and advisors should not all inherit the same view of the record.
We pair policy-driven access control with service-level safeguards for critical invariants, such as owner protection. That combination reflects the control discipline expected in mature enterprise software.
Continue your review
See how the product model and the trust model fit together.
If you are evaluating Wholekin for a principal household, advisor workflow, or family office setup, the next useful step is usually to review the feature model and the operating use cases alongside the trust controls.