Security that goes beyond storage— built for sharing
DocKosha is designed for teams sharing sensitive documents. We combine encryption with policy controls like watermarking, gated links, and privacy-first analytics.
Security controls at a glance
This page is a high-level overview for customers and security reviewers. If you need specifics for a questionnaire, contact us.
Encryption in transit & at rest
Authentication
Role-based access control
Row Level Security (RLS)
Secure sharing controls
Internal audit logs
Dynamic watermarking
Privacy-first analytics
Operational monitoring
How DocKosha approaches security
We treat secure document sharing as a product capability, not a marketing checkbox. Encryption is important, but preventing leaks often requires enforcing policy at the link, room, and document level.
Policy controls for sharing
DocKosha focuses on controls that stay effective after you click “share”:
- Link-level permissions (view/download controls)
- Gating (e.g., verification, allowlists/blocklists, NDA)
- Expiration and revocable access patterns
- Watermarking for accountability and deterrence
Privacy-first analytics
Viewer analytics are designed to surface engagement signals while minimizing sensitive data collection.
- We avoid storing raw IP addresses
- Identity is collected only when link settings require it
- Events focus on viewing, downloads, and time spent
Reporting a vulnerability
If you believe you’ve found a security issue, email us with steps to reproduce and any relevant logs or screenshots.