Network Security
Protect your Activepieces instance at the network level:TLS/SSL Configuration
Use Valid Certificates
Deploy with trusted SSL certificates:
- Let’s Encrypt (free)
- Commercial CA certificates
- Internal CA for private deployments
Firewall Configuration
Restrict network access to essential ports:- Required Ports
- Optional Ports
| Port | Service | Access |
|---|---|---|
| 443 | HTTPS API/UI | Public |
| 5432 | PostgreSQL | Internal only |
| 6379 | Redis | Internal only |
Reverse Proxy Setup
Use a reverse proxy for additional security:IP Allowlisting
Restrict admin access by IP:Secrets Management
Properly handle sensitive configuration:Environment Variables
Critical Secrets
Critical Secrets
Never hardcode these values:
Secure Generation
Secure Generation
Generate strong random secrets:
Secret Rotation
Secret Rotation
Rotate secrets regularly:
- Database passwords: Every 90 days
- API keys: Every 180 days
- Encryption keys: Use key versioning
- JWT secrets: Every year
Secret Manager Integration
Use external secret managers for production:Data Encryption
Activepieces encrypts sensitive data at multiple layers:Encryption at Rest
Application-Level Encryption
Activepieces encrypts:
- Connection credentials
- OAuth tokens
- Webhook secrets
- Secret manager configurations
Encryption in Transit
Database Connections
Database Connections
Enable SSL for PostgreSQL:SSL modes:
require: Encrypt connectionverify-ca: Verify server certificateverify-full: Verify server identity
Redis Connections
Redis Connections
Use TLS for Redis:
External API Calls
External API Calls
All outbound connections use HTTPS by default.
Pieces validate SSL certificates automatically.
Encryption Key Management
Access Control
Authentication Security
Strong Passwords
Enforce password requirements:
- Minimum 12 characters
- Mixed case, numbers, symbols
- No common passwords
- Password history (prevent reuse)
Multi-Factor Auth
Enable 2FA/MFA:
- TOTP (Google Authenticator)
- SMS (for enterprise)
- Hardware keys (FIDO2)
Session Management
Configure session security:
- Session timeout: 8 hours
- Idle timeout: 30 minutes
- Concurrent sessions: Limited per user
SSO
Use enterprise SSO:
- SAML 2.0
- OAuth 2.0
- Centralized identity management
API Security
Monitoring & Auditing
Audit Logging
Enable comprehensive audit logs:- User authentication
- Permission changes
- Flow modifications
- Connection management
- Data access
Security Monitoring
Failed Login Attempts
Failed Login Attempts
Monitor for brute force attacks:
Unusual Activity
Unusual Activity
Alert on suspicious patterns:
- Login from new location
- Multiple failed 2FA attempts
- Bulk data export
- Privilege escalation
System Health
System Health
Monitor security-relevant metrics:
- Certificate expiration
- Secret age
- Failed API calls
- Database connections
Compliance
Data Residency
Compliance Standards
GDPR
- Data encryption at rest and in transit
- Right to deletion (soft delete)
- Audit logs for data access
- Data export capabilities
SOC 2
- Access controls and RBAC
- Encryption of sensitive data
- Audit logging
- Incident response procedures
HIPAA
- PHI encryption
- Access logging
- BAA agreements
- Minimum necessary access
ISO 27001
- Information security policies
- Risk assessment
- Access control
- Cryptographic controls
Vulnerability Management
Keeping Updated
Security Patches
Subscribe to security announcements:
- GitHub security advisories
- Release notes
- Community forums
Incident Response
Detection
Detection
Monitor for security incidents:
- Audit log anomalies
- System alerts
- User reports
Response
Response
Incident response procedure:
- Isolate affected systems
- Preserve evidence (logs)
- Assess impact
- Contain breach
- Eradicate threat
- Recover systems
- Post-incident review
Communication
Communication
Notify stakeholders:
- Internal security team
- Affected users
- Compliance/legal teams
- Regulators (if required)
Security Checklist
Network
✅ HTTPS enabled with valid certificate
✅ Firewall configured
✅ Reverse proxy deployed
✅ Rate limiting enabled
Secrets
✅ Secrets in secret manager
✅ Strong random secrets
✅ No secrets in code/logs
✅ Regular rotation schedule
Encryption
✅ Database encryption enabled
✅ TLS for all connections
✅ Backups encrypted
✅ Encryption key secured
Access Control
✅ SSO configured
✅ MFA enabled
✅ RBAC implemented
✅ Regular access reviews
Related Topics
Secret Managers
Integrate secret management
Audit Logs
Track security events
SSO Configuration
Set up SSO authentication