Links

Security

Find out about UI Bakery data security measures

Is my data stored securely on UI Bakery?

We do not store any of the data returned by your databases on our end. UI Bakery just serves as a proxy and doesn’t expose your sensitive credentials to the browser in order to prevent security breaches. We also have an on-prem version, where you can be fully in control of UI Bakery and your data by securely storing it on your own VPS (Virtual private server).

Do you grant any security measures? Which ones?

  • UI Bakery connects to your data sources only through whitelisted IP:
52.176.109.125
  • All credentials to your data sources are encrypted
  • All Cloud connections are encrypted with TLS.
  • We keep detailed audit logs of all internal systems
  • UI Bakery Cloud is hosted in Azure datacenters on servers that are SOC 1 and SOC 2 compliant. We also maintain data redundancy on our cloud instances via regular backups.
  • For on-premise versions, we are physically unable to access any data related to your UI Bakery instance.
  • Maintain an open channel of communication with security researchers to allow them to report security vulnerabilities responsibly. If you notice a security vulnerability, please email us at [email protected] and we'll resolve them ASAP.

What data does UI Bakery store?

We only store your usage metadata, like:
  • User data (emails, authorized user accounts)
  • Page Views and Page URLs
  • Data source data (name, type of data source)
  • Components (types of components)
  • Action data (name, type of action)
If you notice any security vulnerabilities, please email us at [email protected]

Vulnerability Management

Scanning

To maintain the integrity and security of our software, we employ regular scanning of container images. This is a crucial step in identifying and addressing vulnerabilities. We utilize the Trivy tool, a trusted open-source vulnerability scanner, to carry out these scans. Trivy performs comprehensive scans to identify vulnerabilities, which include operating system (OS) and dependency vulnerabilities. This process helps us detect issues before they can be exploited, ensuring your applications are protected from potential threats.

Timely Response

At UI Bakery, we understand the urgency of addressing vulnerabilities. Our commitment to security means we have established clear response timelines to ensure the safety and integrity of our software.
  • Direct Impact on UI Bakery: In cases where a critical vulnerability directly affects the core of UI Bakery itself, we will initiate immediate action to address the issue.
  • Critical Vulnerabilities: For critical vulnerabilities, our team is dedicated to delivering a fix within 30 days from the moment a solution becomes available.
  • Other Vulnerabilities: Non-critical vulnerabilities are addressed within 60 days of the fix becoming available.

False positive results

Occasionally, security scanners may report false positives, incorrectly identifying vulnerabilities with no impact on our software. Here is the list of known false positives: