Skip to content

Security Overview

Rack Gateway was designed from the ground up with security and compliance in mind. This section covers the security architecture, access controls, and compliance features.

Rack Gateway provides multiple layers of security:

Authentication

Google Workspace OAuth 2.0 with PKCE flow, domain restrictions, and secure session management.

Learn more →

RBAC

Four hierarchical roles with granular permissions controlling access to Convox operations.

Learn more →

Audit Logging

Immutable audit trail with automatic secret redaction and optional S3 WORM storage.

Learn more →

Compliance

Built for SOC 2 compliance with proper access controls, logging, and data retention.

Learn more →

Multiple independent security controls ensure that a failure in one layer doesn’t compromise the system:

LayerProtectionIf Bypassed
NetworkPrivate network accessAuthentication blocks
AuthenticationOAuth + session tokensMFA blocks
MFASecond factor verificationRBAC limits scope
RBACPermission restrictionsAudit logs provide evidence
AuditComplete activity recordForensic investigation

Users receive only the permissions they need:

  • Viewer: Read-only access to non-sensitive data
  • Ops: Operational access without deployment capabilities
  • Deployer: Deployment access without administrative powers
  • Admin: Full access for administrators only

Rack Gateway ships with secure defaults:

  • Sessions expire after inactivity
  • HTTPS required in production
  • Secrets automatically redacted from logs
  • CSRF protection enabled
  • Secure cookie settings

Rack Gateway protects against common threats:

ThreatProtection
Credential theftOAuth (no passwords stored), MFA
Session hijackingSecure cookies, session validation
Privilege escalationStrict RBAC enforcement
Insider threatsAudit logging, RBAC separation
Token leakageShort-lived sessions, API token scoping
Replay attacksToken validation, session tracking
Man-in-the-middleTLS required, certificate validation

Best practices for hardening your Rack Gateway deployment.

Before going to production, verify:

  • HTTPS configured with valid certificates
  • Gateway on private network (Tailscale/VPN recommended)
  • Google OAuth configured with domain restrictions
  • MFA enforcement enabled for all users
  • Audit logging configured with S3 WORM storage
  • Session timeout configured appropriately
  • API tokens scoped with minimal permissions
  • Protected environment variables configured
  • Security notifications enabled
  • Regular access reviews scheduled

See Production Checklist for complete deployment verification.

If you discover a security vulnerability in Rack Gateway:

  1. Do not open a public GitHub issue
  2. Email security concerns to the maintainers
  3. Include detailed reproduction steps
  4. Allow time for a fix before public disclosure

We appreciate responsible disclosure and will acknowledge security researchers in release notes.