Priority: P0 (CRITICAL)
Strict multi-tenant isolation. All child-centric data must be secured via PostgreSQL RLS and service-level validation.
RLS Enforcement Workflow
- Migration: Create tables with
ENABLE ROW LEVEL SECURITY. Define policies usingcurrent_setting('app.current_user_id'). - Entity Logic: Add
@SecurityJSDoc to the entity class. - Security Doc: Update
SECURITY.mdwith the new table and its access logic. - Service Validation: Call
childrenService.validateChildAccess(childId, userId)before any persistence operation.
Core Guidelines
- Mandatory RLS: Every new table linking to a
childorfamilyMUST have RLS enabled in its creation migration. - Centralized Validation: Never reimplement access logic. Use
ChildrenServicefor child/family membership checks. - Traceable Security:
SECURITY.mdis the source of truth. Any change to RLS policies must be reflected there immediately. - Nested Route Constraint: Data isolation is enforced at the controller level via nested routes:
/children/:childId/.... - No Direct Entity exposure: Use Response DTOs to prevent leaking internal database IDs or metadata that could bypass security filters.
Anti-Patterns
- No Public Tables: Don't create child-linked tables without RLS.
- No Manual Policy Checks: Don't write raw SQL access checks in services. Use the centralized validator.
- No Stale Docs: Don't merge RLS changes without updating
SECURITY.mdand entity JSDoc. - No Root IDs: Don't use
/domain/:idfor child data. Always scope by:childId.