Docs
ProductPlatform

Infrastructure

User guide for Infrastructure in the Numezis company portal.

Overview

Internal document security controls: malware scan, encryption, rate limits, and GCS reconciliation.

Where in the app

  • See the module in the company portal sidebar (/c).

Step-by-step

  1. Documents pass malware scanning on upload. (UAT-C-COMM-DOC-004)
  2. Sensitive text fields use encryption at rest. (UAT-C-COMM-DOC-007)
  3. Rate limits protect public ingestion endpoints. (UAT-C-COMM-DOC-006)
  4. Workers reconcile storage with database metadata. (UAT-C-COMM-DOC-003)
  5. Review the audit trail on the record. (Expected: activity event with actor and timestamp.) (UAT-C-COMM-DOC-002)
  6. If access is denied, verify module activation at tenant and company level before retrying. (UAT-C-COMM-DOC-005)

Permissions and modules

Operational concerns—configured by platform admins.

Feature coverage

KeyTitleModuleDocs impactSummaryRiskUAT
communication.documents.audit-redactionAudit Log Filename Redaction for PII ProtectiondocumentsoptionalAudit Log Filename Redaction for PII ProtectionmediumUAT-C-COMM-DOC-004
communication.documents.gcs-lifecycle-iamGCS Lifecycle Policy and IAM Role EnforcementdocumentsoptionalGCS Lifecycle Policy and IAM Role EnforcementhighUAT-C-COMM-DOC-007
communication.documents.gcs-reconciliationGCS-DB Reconciliation Worker for Data AlignmentdocumentsoptionalGCS-DB Reconciliation Worker for Data AlignmenthighUAT-C-COMM-DOC-006
communication.documents.malware-scanMalware Scan Enforcement for Document UploaddocumentsoptionalMalware Scan Enforcement for Document UploadhighUAT-C-COMM-DOC-003
communication.documents.rate-limitingUpload Rate Limiting for Document SecuritydocumentsoptionalUpload Rate Limiting for Document SecuritymediumUAT-C-COMM-DOC-002
communication.documents.text-encryptionExtracted Text Encryption with AES-256-GCMdocumentsoptionalExtracted Text Encryption with AES-256-GCMhighUAT-C-COMM-DOC-005