DronaHQ Security
DronaHQ understands the critical nature of your data and takes security very seriously. This page explains the security features and considerations that DronaHQ has implemented to make your apps as safe as possible.
Data Security
SSL Certification
DronaHQ utilizes SSL/TLS certificates to encrypt sensitive information during transmission. This secures communication between your device and DronaHQ's servers. Self-hosted instances have the option to set up SSL certificates during the installation process or admins can choose to upload their own SSL certificates to establish a secure connection.
SSH Configuration
DronaHQ supports SSH key-based authentication for enhanced server access security. Authorized users possess unique digital keys for access, significantly reducing the risk of unauthorized access through password breaches.
Whitelisting
DronaHQ establishes connections with databases and API endpoints exclusively through whitelisted IP addresses. This approach restricts access to only trusted sources, further securing your data. DronaHQ restricts database and API connections to pre-approved IP addresses, 54.164.199.220
and 34.233.152.191
functioning like a firewall whitelist. This ensures that only authorized sources can access your data.
Audit Log
DronaHQ maintains detailed audit logs to monitor and control access to data. These logs provide a comprehensive record of user activities, ensuring that any unauthorized access attempts can be quickly identified and addressed. It allows you to integrate various loggers to capture events and activities from your modules, such as RunAPI. DronaHQ Support following 2 types of Audit Logging - DronaHQ Managed Audit Logging (Available only on Self-hosted version) External Audit Logging
Secure Key-Value Storage
DronaHQ provides a secure key-value storage option using variables. This feature allows you to store sensitive information securely within the platform, ensuring that only authorized users and processes can access it.
Query Security
Prepared Statements
DronaHQ enforces prepared statements with its special feature for all SQL queries. This separates user input from the actual SQL code, preventing malicious code injection attempts (SQL injection). Imagine building a Lego structure with pre-defined pieces (prepared statements) – you can't inject unauthorized elements into the final design.
Secrets Management
DronaHQ employs a dedicated secrets manager to securely store sensitive information like API keys and database credentials. This eliminates the risk of hardcoding them in your application code, which can be vulnerable to breaches. Think of it as a secure vault for your digital keys, ensuring only authorized users can access them..
Credential Handling at Backend
When executing a query, the DronaHQ server securely appends sensitive credentials just prior to forwarding the request to your backend service. This process ensures that sensitive credentials are not exposed to the client's browser.
No Response Data Logging
DronaHQ's backend acts as a secure proxy. It doesn't log or store any response data retrieved from databases or APIs. Think of it as a blind intermediary – it facilitates communication but doesn't keep a record of the conversation, minimizing the risk of data leakage
Prevent Resource Request Spoofing
DronaHQ includes an option to prevent resource request spoofing, protecting against replay attacks. This security measure ensures that requests to resources cannot be intercepted and reused maliciously.
JavaScript Security
XSS Protection
DronaHQ implements measures to protect against Cross-Site Scripting (XSS) attacks. These include input sanitization, which removes potentially malicious code from user inputs, and restricting access to specific DOM APIs that could be exploited for XSS attacks.
Client-Side Execution
JavaScript code within a DronaHQ app executes on the client's side. This implies that users can use browser tools to inspect and potentially view your JavaScript code. Code visibility is an inherent trait of client-side JavaScript, underscoring the need for caution when dealing with sensitive information.
Login Security
Two-Factor Authentication (2FA)
DronaHQ supports two-factor authentication (2FA) to provide an additional layer of security for user accounts. This ensures that even if a password is compromised, unauthorized access is still prevented.
Single Sign-On (SSO) Support
DronaHQ integrates with Single Sign-On (SSO) providers, allowing users to authenticate using their existing credentials from trusted identity providers, streamlining the login process and enhancing security.
Login Timeout
To prevent unauthorized access due to inactivity, DronaHQ implements login timeouts. Users are automatically logged out after a period of inactivity, reducing the risk of unauthorized access.
Number of Devices
DronaHQ limits the number of devices a user can be logged into simultaneously. This restriction helps prevent unauthorized access from multiple devices.
Biometric/Passcode Authentication
DronaHQ supports biometric and passcode authentication on mobile devices, adding an extra layer of security by ensuring that only the device owner can access the application.
Builder IP Restriction
DronaHQ provides a Builder IP restriction feature, allowing you to restrict access to the builder interface to specific IP addresses. This helps ensure that only authorized users from trusted locations can modify your applications.
Mobile Security
Jailbroken Device Detection
DronaHQ identifies and restricts access from jailbroken (iOS) or rooted (Android) devices. These compromised devices lack the security measures of stock devices, posing a higher security risk. By preventing access from such devices, DronaHQ safeguards your app and user data.
Screenshot Restrictions
DronaHQ offers granular control over screenshots on Android devices. You can completely prevent users from capturing screenshots and protecting sensitive information displayed within the app by disabling screenshot feature. Along with this one can track attempts to capture screenshots, allowing you to investigate potential security incidents by enabling Screenshot Logging.
These security implementations demonstrate DronaHQ's commitment to maintaining a secure environment for developers and users alike. By following the guidelines provided, you can contribute to creating secure applications on the DronaHQ platform.
Reporting Security Vulnerabilities
DronaHQ maintains an open communication channel with security researchers to report security vulnerabilities responsibly. If you notice a security vulnerability, please raise ticket from DRonaHQ Platform.