Dreamlit takes security seriously. We maintain strict security protocols and
perform regular audits to protect your data.
Security features
Our platform features end-to-end encryption, read-only database access, and
regular security audits with no data storage outside of processing.
Compliance
We maintain regular penetration testing and a security bug bounty program.
GDPR and SOC 2 compliance coming soon.
Overview
Dreamlit implements multiple layers of security to protect your data and ensure the safety of your notification workflows. Our founding team brings extensive security and engineering experience from companies like Netflix, Google, and Stanford, with a combined 20+ years of software engineering expertise.Database security
We provide read-only access by default, double-encrypted credentials, scoped
permissions, and SSL/TLS encrypted connections.
Infrastructure
Our platform includes managed hosting, DDoS protection, intrusion detection,
and automated vulnerability scanning.
Key security features
Database access controls
Database access controls
- Support for scoped permissions to restrict access to specific tables
- Database credentials are double encrypted at rest
- Credentials never exposed in plaintext
- Access logs for all database operations
Data processing
Data processing
- AES-256 encryption for all data at rest - No persistent storage of your data (it’s on your database) - Automatic data cleanup after processing - Regular security patches and updates
Authentication and authorization
Authentication and authorization
Infrastructure security
Our infrastructure is built with security in mind:1
Network security
Multiple layers of firewalls, network segregation, and DDoS protection
2
Encryption
TLS/HTTPS for all connections and AES-256 encryption for data at rest
3
Access controls
Principle of least privilege with role-based permissions and 2FA
4
Monitoring
24/7 infrastructure and security monitoring with intrusion detection
Reporting security issues
If you believe you’ve found a security vulnerability, please report it
immediately.
- Email: [email protected]
- Response time: Within 24 hours
- Bug bounty program available for eligible reports