ATStatus
ATStatus WikiLoading documentation...

Security

Security best practices and features for protecting your ATStatus application.

Security Features

Role-Based Access Control

Fine-grained permission system

Secure Sessions

Encrypted session management

Input Validation

Protection against injection attacks

Rate Limiting

Protection against abuse

Audit Logging

Track all changes and actions

CSRF Protection

Cross-site request forgery protection

Authentication

Authentication uses a custom session-based system with secure cookie management:

Secure password hashing with bcrypt
HMAC-signed session tokens
Server-side session storage
Automatic session expiration (24h)
Secure cookie settings in production
Optional two-factor authentication (TOTP)

Role-Based Access Control

The RBAC system provides four default roles with hierarchical permissions. See full RBAC documentation →

OWNER

Full system access

ADMIN

Administrative access

MEMBER

Standard team access

READ_ONLY

View-only access

Audit Logging

All significant actions are logged for compliance. IP addresses and sensitive data in audit logs are only visible to users with AUDIT_VIEW_SENSITIVE permission.

Deployment Best Practices

  • Always use HTTPS in production
  • Set strong SESSION_SECRET (min 32 characters)
  • Change default admin password immediately
  • Keep dependencies updated
  • Use environment variables for secrets
  • Enable rate limiting

API Key Best Practices

  • Use scoped API keys when possible
  • Set expiration dates on keys
  • Rotate keys regularly
  • Revoke unused keys
Security Vulnerabilities: If you discover a security vulnerability, please report it responsibly. Do not create public issues for security problems.