Bubble security information

This information is valid as of 1st of January 2020
  1. Bubble uses Amazon RDS’s AES-256 encryption and Amazon Web Service’s KMS to manage encryption keys.
  1. Bubble uses SHA256 with a randomly-generated salt that is prepended to the password
  1. Data encrypted in-transit while using the API connection is using latest SSL certification. See more details: https://www.ssllabs.com/ssltest/analyze.html?d=bubble.io&hideResults=on&latest
  1. Bubble has documented key management procedures that govern where keys are stored, who owns them, how the keys are used, and the lifecycle of the keys. It uses Amazon Web Service’s KMS to manage encryption keys.
  1. Bubble prevents parallel login attempts, and apply a linearly-increasing time penalty for subsequent failed password attempts
  1. All production code changes pass through a code review process prior to release. This code review includes evaluating the changes for potential security defects.
  1. Bubble uses automatic vulnerability detection software, both internally and hosted by a third-party service, to detect application and network vulnerabilities.
  1. Bubble receives notifications from vendors or other third parties about security advisories related to its software components from GitHub + NPM
  1. Bubble’s software development lifecycle incorporates industry best practices at all stages. We have a number of controls including code review, automated code testing tools, automated and manual vulnerability testing including OWASP top ten testing, and continuous monitoring. Bubble uses code analysis tools to detect security and vulnerability defects. These tools are integrated with a continuous deployment workflow, and code that does not pass is prevented from being deployed.
  1. Bubble currently protects its networks via intrusion prevention systems including firewalls and authentication layers. Bubble logs application-level events to detect and respond to security incidents. Evaluating IDS systems or web application firewalls for possible implementation is Bubble's security roadmap.
Share