Security at Rebirth API

We take the security of your data seriously. This page outlines our current security practices and our roadmap toward SOC 2 compliance.

Security Practices

Encryption in Transit

All API traffic is served over TLS 1.2+ (HTTPS). Plaintext HTTP connections are automatically redirected. Certificate management is handled by our edge provider.

Encryption at Rest

Database storage is encrypted at rest using AES-256. Backups are encrypted with the same standard.

Password Security

User passwords are hashed with bcrypt (cost factor 10) and salted. We never store or log plaintext passwords.

API Key Security

API keys are generated with 32 characters of cryptographic randomness (nanoid). Keys are transmitted only at creation time — dashboard views show only the last 8 characters.

Rate Limiting & Abuse Protection

All endpoints enforce IP-based and per-key rate limits. Authentication endpoints have stricter limits (15 attempts per 15 minutes) to prevent brute-force attacks.

Input Validation

All API inputs are validated and sanitized server-side. We use parameterized queries (Prisma ORM) to prevent SQL injection.

Infrastructure Security

Hosted on Vercel's edge network with automatic DDoS protection, WAF rules, and global CDN. Database hosted on managed PostgreSQL with automatic failover.

Access Control

Principle of least privilege across all infrastructure. Production environment variables are encrypted and accessible only to the deployment pipeline.

Dependency Management

Dependencies are regularly audited for known vulnerabilities. We use lockfiles to ensure reproducible, verified builds.

Logging & Monitoring

API requests are logged with endpoint, status code, and latency for anomaly detection. We do not log request or response bodies. Real-time monitoring alerts the team to errors and unusual traffic patterns.

SOC 2 Compliance Roadmap

We are actively working toward SOC 2 Type II certification. Here is our phased approach:

CurrentActive

  • TLS encryption everywhere
  • Bcrypt password hashing
  • Rate limiting & abuse protection
  • Usage logging & monitoring
  • Secure API key generation
  • Input validation & parameterized queries
2

Q2 2026

  • Formal security policies documented
  • Vendor risk assessments
  • Employee security training
  • Incident response plan published
  • Penetration testing by third party
3

Q3 2026

  • SOC 2 Type I audit engagement
  • Continuous compliance monitoring
  • Bug bounty program launch
  • GDPR data processing agreements
4

Q4 2026

  • SOC 2 Type I report available
  • SOC 2 Type II audit begun
  • BAA available for healthcare customers

Responsible Disclosure

If you discover a security vulnerability in our Service, please report it responsibly. We appreciate the security research community's help in keeping our users safe.

Email: support@rebirthapi.com|Subject line: Security Vulnerability Report

Questions about our security practices? Contact support@rebirthapi.com