Security at DockSweep
Your security and privacy are our top priorities
Our Security Commitment
At DockSweep, we take security seriously. We understand that you trust us with access to your Docker registries, and we are committed to protecting your data and credentials with industry-leading security practices.
This page outlines the security measures we implement to keep your information safe and secure.
1. Data Encryption
1.1 Encryption in Transit
All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher. This ensures that your information cannot be intercepted or read by unauthorized parties during transmission.
- All connections use HTTPS with strong cipher suites
- SSL/TLS certificates are regularly updated
- HSTS (HTTP Strict Transport Security) is enforced
1.2 Encryption at Rest
Sensitive data stored in our databases is encrypted at rest using industry-standard encryption algorithms. This includes:
- Encrypted database storage
- Encrypted backup files
- Encrypted access tokens and credentials
2. Authentication and Access Control
2.1 Password Security
We never store your passwords in plain text. All passwords are:
- Hashed using bcrypt with appropriate cost factors
- Subject to minimum complexity requirements
- Protected against brute-force attacks with rate limiting
2.2 Multi-Factor Authentication
We support multi-factor authentication (MFA) to add an extra layer of security to your account. We strongly recommend enabling MFA for all accounts.
2.3 Access Tokens
When you connect your Docker registry, we store only encrypted access tokens. We never store your registry passwords. These tokens are:
- Encrypted before storage
- Only decrypted when needed for registry operations
- Never logged or exposed in error messages
3. Infrastructure Security
3.1 Cloud Infrastructure
Our infrastructure is hosted on reputable cloud providers with robust security measures:
- Regular security audits and compliance certifications
- Physical security controls at data centers
- Redundant systems for high availability
- Automated backups with point-in-time recovery
3.2 Network Security
Our network is protected by multiple layers of security:
- Firewalls and intrusion detection systems
- DDoS protection and mitigation
- Network segmentation and isolation
- Regular security monitoring and threat detection
4. Application Security
4.1 Secure Development Practices
We follow secure software development lifecycle (SDLC) practices:
- Regular security code reviews
- Automated vulnerability scanning
- Dependency updates and patch management
- Security testing and penetration testing
4.2 Input Validation and Sanitization
All user inputs are validated and sanitized to prevent:
- SQL injection attacks
- Cross-site scripting (XSS)
- Command injection
- Other injection-based attacks
4.3 API Security
Our APIs are secured with:
- Authentication tokens (JWT)
- Rate limiting to prevent abuse
- Request validation and authorization checks
- HTTPS-only communication
5. Monitoring and Incident Response
5.1 Security Monitoring
We continuously monitor our systems for security threats:
- 24/7 security monitoring and alerting
- Log analysis and anomaly detection
- Intrusion detection systems
- Regular security audits
5.2 Incident Response
In the event of a security incident, we have procedures in place to:
- Quickly identify and contain threats
- Assess the impact and scope
- Notify affected users promptly
- Remediate issues and prevent recurrence
6. Compliance and Certifications
We are committed to maintaining compliance with industry standards and regulations:
- GDPR compliance for European users
- Regular security assessments
- Third-party security audits
- Industry best practices and standards
7. Data Backup and Recovery
We maintain regular backups of all critical data:
- Automated daily backups
- Encrypted backup storage
- Point-in-time recovery capabilities
- Regular backup restoration testing
8. Your Role in Security
Security is a shared responsibility. Here's how you can help keep your account secure:
- Use a strong, unique password
- Enable multi-factor authentication
- Keep your access tokens secure
- Review your account activity regularly
- Report any suspicious activity immediately
- Keep your email account secure (used for password resets)
9. Security Best Practices for Registry Tokens
When connecting your Docker registry:
- Use personal access tokens instead of passwords when possible
- Create tokens with minimal required permissions
- Regularly rotate your access tokens
- Revoke tokens immediately if compromised
- Use separate tokens for different registries
10. Vulnerability Disclosure
We take security vulnerabilities seriously. If you discover a security vulnerability, please report it to us responsibly:
- Email: info@docksweep.com or security@docksweep.com
- Responsible Disclosure: Please allow us time to address the vulnerability before public disclosure
- Bug Bounty: We appreciate responsible disclosure and may offer recognition or rewards for valid security issues
11. Updates to This Security Page
We may update this Security page from time to time to reflect changes in our security practices or for other operational, legal, or regulatory reasons. We encourage you to review this page periodically.
12. Contact Us
If you have any questions or concerns about security at DockSweep, please contact us: