Security at Rebirth API
We take the security of your data seriously. This page outlines our current security practices and our roadmap toward SOC 2 compliance.
Security Practices
Encryption in Transit
All API traffic is served over TLS 1.2+ (HTTPS). Plaintext HTTP connections are automatically redirected. Certificate management is handled by our edge provider.
Encryption at Rest
Database storage is encrypted at rest using AES-256. Backups are encrypted with the same standard.
Password Security
User passwords are hashed with bcrypt (cost factor 10) and salted. We never store or log plaintext passwords.
API Key Security
API keys are generated with 32 characters of cryptographic randomness (nanoid). Keys are transmitted only at creation time — dashboard views show only the last 8 characters.
Rate Limiting & Abuse Protection
All endpoints enforce IP-based and per-key rate limits. Authentication endpoints have stricter limits (15 attempts per 15 minutes) to prevent brute-force attacks.
Input Validation
All API inputs are validated and sanitized server-side. We use parameterized queries (Prisma ORM) to prevent SQL injection.
Infrastructure Security
Hosted on Vercel's edge network with automatic DDoS protection, WAF rules, and global CDN. Database hosted on managed PostgreSQL with automatic failover.
Access Control
Principle of least privilege across all infrastructure. Production environment variables are encrypted and accessible only to the deployment pipeline.
Dependency Management
Dependencies are regularly audited for known vulnerabilities. We use lockfiles to ensure reproducible, verified builds.
Logging & Monitoring
API requests are logged with endpoint, status code, and latency for anomaly detection. We do not log request or response bodies. Real-time monitoring alerts the team to errors and unusual traffic patterns.
SOC 2 Compliance Roadmap
We are actively working toward SOC 2 Type II certification. Here is our phased approach:
CurrentActive
- ✓TLS encryption everywhere
- ✓Bcrypt password hashing
- ✓Rate limiting & abuse protection
- ✓Usage logging & monitoring
- ✓Secure API key generation
- ✓Input validation & parameterized queries
Q2 2026
- ○Formal security policies documented
- ○Vendor risk assessments
- ○Employee security training
- ○Incident response plan published
- ○Penetration testing by third party
Q3 2026
- ○SOC 2 Type I audit engagement
- ○Continuous compliance monitoring
- ○Bug bounty program launch
- ○GDPR data processing agreements
Q4 2026
- ○SOC 2 Type I report available
- ○SOC 2 Type II audit begun
- ○BAA available for healthcare customers
Responsible Disclosure
If you discover a security vulnerability in our Service, please report it responsibly. We appreciate the security research community's help in keeping our users safe.
Email: support@rebirthapi.com|Subject line: Security Vulnerability Report
Questions about our security practices? Contact support@rebirthapi.com