Security & compliance

Security at Menuella

Menuella is built with modern security standards to protect your restaurant data, customer information, and business operations — without compromising speed or usability.

Security is not an add-on at Menuella — it is part of our architecture.

GDPR Compliant
Secure Authentication
Encrypted Data
Edge Protection

Secure Login Across All Menuella Apps

Menuella uses modern authentication to keep your account protected and your access seamless across the ecosystem.

  • Single secure login across Menuella products
  • Powered by Auth0 authentication infrastructure
  • Support for passkeys (where available)
  • Protection against suspicious login attempts

Data Protection & Encryption

We protect restaurant and customer data with industry-standard security practices.

  • TLS 1.3 encrypted connections
  • Encryption in transit and at rest
  • Secure key management and access control policies
  • Secure handling of restaurant and customer information

Secure Payments

All payments are processed through Stripe, a PCI-DSS Level 1 certified payment provider. Menuella never stores card data on its servers.

Edge-Secured Architecture

Menuella runs on Cloudflare's global edge network, delivering enterprise-grade protection, performance, and reliability for modern restaurants.

  • Enterprise-grade DDoS mitigation
  • Web Application Firewall (WAF)
  • Bot and abuse protection
  • Rate limiting and API traffic filtering
  • Automatic TLS management

GDPR & Privacy by Design

Menuella is built with GDPR principles from day one. Restaurants stay in control of their brand, data, and customer relationships.

  • GDPR-compliant processing
  • Transparent privacy policy
  • Data minimization principles
  • Restaurants retain full ownership of their customer data
  • Menuella never sells or monetizes restaurant data

Reliability, Monitoring & Updates

Menuella is actively maintained and continuously improved. We monitor systems and ship regular updates to keep performance and security strong.

  • Continuous monitoring and incident response
  • Regular security patches and infrastructure updates
  • High availability architecture
  • Public system status page

Security Contact

If you believe you've found a security vulnerability, please contact us and we will investigate immediately.

We follow a responsible disclosure policy and appreciate security researchers who report vulnerabilities ethically.