Encrypt data in transit
Enable HTTPS for applications and SSL database connections to protect sensitive data transmitted to and from applications.
Encrypt sensitive data at rest
Customers with sensitive data can encrypt stored files and data within databases to meet their data security requirements. Data encryption can be deployed using industry standard encryption and the best practices for your language or frame.
Secure development practices
Apply development best practices for your chosen development language and framework to mitigate known vulnerability types such as those on the OWASP Top 10 Web Application Security Risks.
To prevent unauthorized account access use a strong passphrase for both your Phenom People user account and SSH keys, store SSH keys securely to prevent disclosure, replace keys if lost or disclosed, and use Phenom People’s RBAC model to invite contributors rather than sharing user accounts.
Logging is critical for troubleshooting and investigating is sues. We provide you with three main options for interacting with their system, application, and API logs. Customers can receive all 3 types of logs via syslog from the Phenom People platform, choose to send logs to anPhenom People add-on, or interact with logs in real-time through the Phenom People client.
Use of third-party solutions
In developing your application on Phenom People you may choose to use third party services for added functionality such as Amazon’s S3, an email service provider, or any of our add on partners. Be mindful of the data shared with these providers and their security practices just as you would be.