Data Security & Policy
WebsiteDashboard
  • Introduction
  • Data Security
    • Data Storage
    • Data Transmission
    • User Authentication and Authorization
    • Logging and Monitoring
    • Multi-factor authentication (MFA)
  • Data Privacy
    • Data Collection and Use
    • Data Sharing and Disclosure
    • User Rights
    • Compliance
    • Security and Privacy Updates
    • Contact Information
    • Additional Considerations
Powered by GitBook
On this page
  1. Data Security

User Authentication and Authorization

JWT Authentication:

  • We utilize JSON Web Tokens (JWTs) for secure user authentication. JWTs are self-contained tokens containing essential user information and a digital signature. This approach eliminates the need to store sensitive user credentials on our servers, reducing the attack surface.

  • Short Expiration Times: JWTs are issued with short expiration times, further enhancing security by limiting the window of opportunity for attackers to exploit a compromised token.

  • Secure JWT Storage: We prioritize the secure storage of JWTs on the client-side. We utilize HttpOnly cookies with the Secure flag to ensure that these tokens are not accessible through JavaScript and are only transmitted over secure HTTPS connections.

Role-Based Access Control (RBAC):

  • We implement RBAC to grant access permissions based on user roles and assigned privileges. This ensures that users can only view, edit, or modify data relevant to their specific tasks within your organization. By following the principle of least privilege, we minimize user permissions, further reducing the potential impact of a security breach.

PreviousData TransmissionNextLogging and Monitoring

Last updated 11 months ago