-
Notifications
You must be signed in to change notification settings - Fork 455
Security Model
Nyk edited this page Mar 6, 2026
·
1 revision
Last reviewed: 2026-03-06 Owner: security
Use this page for security controls, responsibilities, and deployment hardening.
- Session cookie (
mc-session, login endpoint). - API key (
x-api-keyheader). - Google Sign-In (with admin approval flow).
Roles:
-
viewer: read-only. -
operator: read + operational writes. -
admin: full system operations and user/settings control.
- Change default credentials before any shared deployment.
- Run behind reverse proxy with TLS.
- Restrict host/origin via
MC_ALLOWED_HOSTS. - Never expose unauthenticated dashboard endpoints publicly.
- Rotate API keys periodically.
- Keep secrets in environment variables, not in repo.
- Persist runtime data in secured
.datastorage. - Restrict filesystem access to runtime user.
- Constant-time webhook signature verification.
- Device identity signing for gateway auth.
- CSRF/auth network access control in proxy middleware.
- RBAC enforcement at API layer.
- Revoke compromised credentials.
- Rotate API keys and session secrets.
- Capture logs and timeline.
- Patch and redeploy.
- Document in postmortem and update this page.