Security Policy

1. General Provisions

  • This security policy defines the main measures for protecting user data and application infrastructure.
  • The policy is mandatory for all users, employees, and developers working with this application.

2. Data Storage and Processing

  • All users' personal data is stored in a secure database (PostgreSQL) with regular backups.
  • Access to data is limited to authorized users using a multi-level permissions system.
  • All files uploaded by users are stored in a separate secure storage and are accessible only to their owners and administrators.

3. Authentication and Authorization

  • User authentication is implemented using modern standards: JWT tokens are stored only in secure httpOnly cookies.
  • Protection against CSRF attacks (cross-site request forgery) is implemented on all critical endpoints.
  • Strict user rights checking is applied for access to personal data and operations.

4. Encryption and Communication Security

  • All data transmission between the client and the server is carried out over a secure HTTPS protocol.
  • User passwords are stored only in encrypted form (bcrypt or a similar algorithm).

5. Development and Operations Security

  • Only up-to-date and trusted versions of third-party libraries and dependencies are used.
  • All changes undergo code review and testing before deployment.
  • Regular security audits and monitoring of suspicious activity are conducted.

6. Backup and Recovery

  • The database and user files are regularly backed up to secure servers.
  • Fast data recovery procedures are implemented in case of failures.

7. User Responsibility

  • Users are required to use strong passwords and not share their data with third parties.
  • Uploading malicious files or inappropriate content is strictly prohibited.
  • If a vulnerability or suspicious activity is discovered, the user must immediately notify the project administration.

8. Incident Response

  • In the event of incidents or data breaches, an internal investigation is immediately conducted.
  • Users will be notified of any breaches or incidents as soon as possible via the contact information provided during registration.

9. Changes to the Security Policy

  • The security policy may be amended, with users being notified via the website and/or email.