Security
Last updated: 15 May 2026
We treat security as a foundation, not a feature. This page is a public summary of how we operate; the full security documentation is available under NDA.
Application security
- Argon2id password hashing with OWASP-recommended parameters.
- TOTP 2FA available on every account, mandatory for super-admins.
- HMAC-SHA256 request signing on every public API call, with timestamp + nonce replay protection.
- AES-256-GCM encryption at rest for sensitive secrets (API key plaintexts, TOTP secrets).
- Tenant isolation enforced by a Prisma extension that auto-injects
organizationIdon every query — defence in depth even if a controller forgets to filter. - CSP, HSTS, X-Frame-Options and a sensible Referrer-Policy set on every response.
Infrastructure
- TLS 1.3 everywhere, including internal service-to-service.
- Database connections over TLS with verified certificates.
- Production deployments are immutable and require code review + green CI to merge.
- Secrets live in a managed secret store, never in source control.
- Hourly point-in-time recoverable database backups.
Operational practices
- Annual third-party penetration test.
- Quarterly internal access reviews for production data.
- All employees use phishing-resistant 2FA on company accounts.
- Incident response runbook with named on-call.
Responsible disclosure
We welcome reports from security researchers. Please email security@keystack.dev with details. We aim to:
- Acknowledge within 24 hours.
- Provide a remediation plan within 5 business days.
- Credit you publicly (if you wish) once the issue is patched.
Please don't run automated scanners against production beyond gentle low-volume probes — we'd rather hear about findings than have your IP throttled.