Skip to main content

User Access & Security Controls

dealhead platform security: authentication, MFA, permissions, publishing access, and user management.

Updated over 3 weeks ago

We secure every User account and action on dealhead with layered authentication protocols, strict access controls, and continuous monitoring. From registration to account retirement, every step is designed to ensure that only the right Users have the right level of access.

Authentication and Identity Verification

Our authentication system ensures that only verified Users can access the platform. This includes:

  • Invitation-only registration with unique email links validated before sign-up

  • Automatic expiration of unused invitations

  • Mandatory multi-factor authentication (MFA) during first login and for sensitive actions

  • Session controls that expire sign-in tokens after 24 hours and require re-authentication for high-risk operations

  • IP-based anomaly detection to identify suspicious login activity

Password and Recovery Policies

We enforce strong password requirements: a minimum of 12 characters, with a mix of letters, numbers, and symbols. Account recovery is handled through a verified backup email or administrator-assisted identity check, ensuring that only legitimate Users can regain access.

Continuous Monitoring and Auditing

The platform is monitored in real time to detect unusual activity across authentication and access layers. Security operations include:

  • Quarterly penetration testing to identify and address vulnerabilities

  • Automated alerts for high-risk login patterns

  • Full audit logs for authentication events, permission changes, and account removals

Role-Based Access Control

Access permissions are tied to specific roles to prevent unauthorized changes:

  • Team Captains can add or remove members, assign roles, manage permissions, and control publishing

  • Regular Members can remove themselves from teams (unless they are the last remaining Team Captain)

This ensures that elevated privileges are only available to those with explicit responsibility.

Publishing-Based Access

Publishing-Based Access allows granular control over who can see and interact with a Project:

  1. Default Access — When a Project is created, it is shared only with Users in the same Organization/Firm as the creator.

  2. Expanding Access Within a Team — A Team Captain User can share the Project with other Organizations that are part of the same Team.

  3. Cross-Team Access — When appropriate, a Team Captain User can share the Project with another Team on the same Project.

At every stage, publishing changes are intentional, require confirmation, and are logged for audit purposes. This ensures that Project visibility grows only when explicitly approved.

User Removal and Lifecycle Management

Account removal procedures are designed to preserve security and maintain necessary records:

  • Users with no project history are fully deleted

  • Previously active Users are marked as “Removed” to preserve an audit trail while revoking access

  • The last remaining Team Captain must assign a successor before leaving a team

Organization and Team Structure

Each User belongs to a single Organization, determined by their verified email domain. Public email addresses (e.g., generic webmail) create single-User Organizations. Users cannot hold memberships in multiple teams on the same Project, preventing cross-team data exposure.

Did this answer your question?