# Security

# Security

This page describes security concepts and operational practices for Curiosity Workspace deployments. Because security requirements differ by organization, treat this as a baseline and align it with your internal policies.

# Security domains

  • Identity and authentication
    • how users log in and how sessions are managed
  • Authorization
    • what users can see and do (roles, permissions, access control)
  • Data protection
    • encryption at rest and in transit
    • backups and retention
  • Operational security
    • secrets management
    • patching and vulnerability management
  • Audit and monitoring
    • logs and traces for security-relevant events

# Recommended baseline practices

  • TLS everywhere for all UI and API traffic.
  • Store tokens and credentials in a secret manager (never in source control).
  • Use least privilege for API tokens and endpoint tokens.
  • Separate environments: dev, staging, prod.
  • Use restricted admin access and require stronger authentication for admins.

# Endpoint security

If you expose custom endpoints to external callers:

  • require endpoint tokens
  • validate inputs and enforce request limits
  • avoid exposing admin-only functionality externally
  • log access and failures

See APIs & Extensibility → Custom Endpoints.

# Next steps