Dreamlit takes security seriously. We maintain strict security protocols and
perform regular audits to protect your data.
Security features
Our platform features encrypted transport, encryption at rest, dedicated
database users, and regular security audits.
Compliance
We maintain regular penetration testing and a security bug bounty program.
GDPR and SOC 2 compliance coming soon.
Overview
Dreamlit implements multiple layers of security to protect your data and ensure the safety of your notification workflows. Our founding team brings extensive security and engineering experience from companies like Netflix, Google, and Stanford, with a combined 20+ years of software engineering expertise. These controls apply to all Dreamlit database integrations, including Supabase and direct PostgreSQL connections.Database security
We use SSL/TLS-encrypted database connections, double-encrypted credentials
at rest, and least-privilege permissions via a dedicated
dreamlit_app
database user.Infrastructure
Our platform includes intrusion detection, automated vulnerability
scanning, and 24/7 infrastructure monitoring.
Key security features
Database access controls
Database access controls
- Dedicated
dreamlit_appuser for stronger isolation and least privilege - Scoped permissions to restrict access to only required tables/operations
- Database credentials are double encrypted at rest
- Credentials are never exposed in plaintext
- Access logs for database operations
Data processing
Data processing
- Data encrypted in transit
- Data encrypted at rest
- No persistent storage of your application data outside your database
- Automatic data cleanup after processing
- Regular security patches and updates
Authentication and authorization
Authentication and authorization
Network access and IP allowlisting
These controls apply to all Dreamlit database connections:- SSL/TLS is always enabled for database connections.
- If your firewall requires allowlisting, use Cloudflare’s published ranges: Cloudflare IP ranges, IPv4, and IPv6.
- Cloudflare ranges may change over time, so keep allowlists synced.
- If you need a custom certificate attached for your database connection, contact support.
Infrastructure security
Our infrastructure is built with security in mind:Reporting security issues
Contact our security team:- Email: [email protected]
- Response time: Within 24 hours
- Bug bounty program available for eligible reports