The ID PASS DataCollect project takes security seriously. This document outlines our security policy, supported versions, and the process for responsibly reporting security vulnerabilities.
We actively maintain and provide security updates for the following versions:
| Version | Supported | Status |
|---|---|---|
| 1.0.x | ✅ Yes | Active development |
| < 1.0 | ❌ No | Pre-release, not recommended for production |
Note: As this is currently version 1.0.0, we recommend always using the latest stable release for security updates.
ID PASS DataCollect handles sensitive household and beneficiary data. Key security features include:
- 🔐 JWT Authentication - Secure API access with role-based permissions
- 📝 Event Sourcing - Complete audit trail of all data changes
- 🔒 Offline-First Design - Data encrypted at rest using IndexedDB encryption
- 🏢 Multi-Tenant Architecture - Isolated data per application instance
- ⚡ Secure Sync - Encrypted data transmission between client and server
We encourage responsible disclosure of security vulnerabilities. Please do not report security vulnerabilities through public GitHub issues.
- Email: Send details to
security@newlogic.com - Subject Line:
[SECURITY] ID PASS DataCollect - [Brief Description] - Include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if available)
- Your contact information
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Regular Updates: We will keep you informed of our progress
- Resolution Timeline: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit security researchers (with permission) in our security advisories
- Report Received: Security team reviews and triages the report
- Verification: We reproduce and verify the vulnerability
- Impact Assessment: We assess the severity and potential impact
- Fix Development: We develop and test a fix
- Coordinated Disclosure: We coordinate the release with the reporter
- Public Disclosure: We publish a security advisory after the fix is available
- Environment Variables: Never commit
.envfiles with real credentials - API Keys: Rotate JWT secrets regularly in production
- Database Security: Use strong passwords and enable SSL for PostgreSQL connections
- Network Security: Run the backend server behind a reverse proxy (nginx/Apache)
- Updates: Keep all dependencies up to date
- TLS/SSL: Always use HTTPS in production
- Database Encryption: Enable PostgreSQL encryption at rest
- Backup Security: Encrypt database backups
- Access Control: Implement proper firewall rules
- Monitoring: Set up security monitoring and alerting
- Regular Audits: Perform regular security audits
When using our Docker configurations:
# Use environment files with proper permissions
chmod 600 .env postgresql.env
# Don't use default passwords in production
# Update all passwords in environment files
# Use specific image tags, not 'latest'
# Review docker-compose.yaml configurationsWe use the following severity classifications:
- Critical: Remote code execution, data breach, authentication bypass
- High: Privilege escalation, sensitive data exposure
- Medium: Denial of service, information disclosure
- Low: Minor information leaks, non-security-impacting bugs
- OWASP Top 10: We follow OWASP security guidelines
- Security Headers: Implement proper HTTP security headers
- Dependency Scanning: We use automated tools to scan for vulnerable dependencies
- Code Analysis: Static code analysis for security issues
- Security Team: security@newlogic.com
- General Issues: https://github.com/idpass/idpass-data-collect/issues
- Website: https://newlogic.com
We recognize security researchers who help improve our security:
To be updated as we receive and resolve security reports.
Last Updated: June 2025 Next Review: July 2025
This security policy is subject to change. Please check this document regularly for updates.