Skip to main content
Dreamlit takes security seriously. We maintain strict security protocols and perform regular audits to protect your data.

Security features

Our platform features encrypted transport, encryption at rest, dedicated database users, and regular security audits.

Compliance

We maintain regular penetration testing and a security bug bounty program. GDPR and SOC 2 compliance coming soon.

Overview

Dreamlit implements multiple layers of security to protect your data and ensure the safety of your notification workflows. Our founding team brings extensive security and engineering experience from companies like Netflix, Google, and Stanford, with a combined 20+ years of software engineering expertise. These controls apply to all Dreamlit database integrations, including Supabase and direct PostgreSQL connections.

Database security

We use SSL/TLS-encrypted database connections, double-encrypted credentials at rest, and least-privilege permissions via a dedicated dreamlit_app database user.

Infrastructure

Our platform includes intrusion detection, automated vulnerability scanning, and 24/7 infrastructure monitoring.

Key security features

  • Dedicated dreamlit_app user for stronger isolation and least privilege
  • Scoped permissions to restrict access to only required tables/operations
  • Database credentials are double encrypted at rest
  • Credentials are never exposed in plaintext
  • Access logs for database operations
  • Data encrypted in transit
  • Data encrypted at rest
  • No persistent storage of your application data outside your database
  • Automatic data cleanup after processing
  • Regular security patches and updates
  • Role-based access control (RBAC) (coming soon)
  • Multi-factor authentication required (coming soon)
  • Single Sign-On (SSO) support
  • Organization-level data isolation
  • Comprehensive access logging
  • Session management and monitoring

Network access and IP allowlisting

These controls apply to all Dreamlit database connections:
  • SSL/TLS is always enabled for database connections.
  • If your firewall requires allowlisting, use Cloudflare’s published ranges: Cloudflare IP ranges, IPv4, and IPv6.
  • Cloudflare ranges may change over time, so keep allowlists synced.
  • If you need a custom certificate attached for your database connection, contact support.

Infrastructure security

Our infrastructure is built with security in mind:
1

Network security

Multiple layers of firewalls and network segregation
2

Encryption

TLS/HTTPS for all connections and AES-256 encryption for data at rest
3

Access controls

Principle of least privilege with role-based permissions and 2FA
4

Monitoring

24/7 infrastructure and security monitoring with intrusion detection

Reporting security issues

If you believe you’ve found a security vulnerability, please report it immediately.
Contact our security team:
  • Email: [email protected]
  • Response time: Within 24 hours
  • Bug bounty program available for eligible reports