Skip to main content
Beta Transparency. LogFleet is in active development. This page documents our current security posture and planned improvements. We believe in being honest about where we are.

Security Philosophy

LogFleet’s edge-first architecture is inherently more secure than cloud-first alternatives:
  1. Data stays local by default - Logs never leave your network unless you explicitly enable streaming
  2. Minimal attack surface - Only metrics (not raw logs) ship to cloud in normal operation
  3. Zero-trust networking - Tailscale mesh for remote access, no exposed ports

Current Security Features

Authentication

FeatureStatusNotes
JWT-based authentication[x] ImplementedRS256 signing, 24h expiry
API key authentication[x] ImplementedFor edge agents
Password requirements[x] Implemented12+ chars, complexity rules
Rate limiting[x] ImplementedPer-IP and per-user limits
Session management[x] ImplementedSecure token handling

Data Protection

FeatureStatusNotes
TLS in transit[x] RequiredAll API endpoints HTTPS-only
Encryption at rest[!] Infrastructure-dependentUse encrypted volumes
Log data isolation[x] By designLogs stay on edge devices
Multi-tenancy[x] ImplementedOrganization-level isolation

Network Security

FeatureStatusNotes
No inbound ports required[x] By designAgent initiates connections
Tailscale integration[x] SupportedZero-trust remote access
Firewall-friendly[x] By designOutbound HTTPS only

Edge Agent Security

The edge agent runs in your infrastructure. Here’s how we secure it:

Container Security

# Recommended security context for Kubernetes
securityContext:
  runAsNonRoot: true
  runAsUser: 65534  # nobody
  readOnlyRootFilesystem: true
  allowPrivilegeEscalation: false
  capabilities:
    drop:
      - ALL

Minimal Permissions

The edge agent needs:
  • Read access to log files you configure
  • Network access to LogFleet API (outbound HTTPS)
  • Disk access for local buffering (configurable path)
It does not need:
  • Root privileges
  • Inbound network access
  • Access to other containers or host resources

API Key Scoping

Edge agent API keys are scoped to specific permissions:
{
  "permissions": [
    "edge:register",    // Register this agent
    "edge:heartbeat",   // Send heartbeats
    "edge:metrics",     // Push metrics
    "edge:stream"       // Stream logs (when enabled)
  ]
}
Create separate API keys for each edge location. Revoke compromised keys without affecting other locations.

Cloud Platform Security

Infrastructure

ComponentProviderSecurity
API hostingAWSVPC, security groups, WAF
DatabasePostgreSQLEncrypted, private subnet
SecretsAWS Secrets ManagerAutomatic rotation
MonitoringInternalNo third-party analytics

Data Handling

  • Metrics only: Cloud stores aggregated metrics, not raw logs
  • Retention: Configurable per organization
  • Deletion: Full data deletion available on request
  • Backups: Encrypted, same-region storage

What We’re Working On

These features are planned but not yet implemented. We’re listing them for transparency, not as promises.

Planned Security Enhancements

FeaturePriorityTarget
SOC 2 Type IIHigh2025
SSO/SAML integrationHighQ2 2025
Audit loggingMediumQ1 2025
Role-based access controlMediumQ2 2025
IP allowlistingLowQ3 2025
Hardware key support (WebAuthn)LowQ3 2025

Compliance Roadmap

StandardStatusNotes
GDPR[x] Architecture supportsData residency by design
SOC 2[o] In progressType I planned 2025
HIPAA[~] PlannedBAA available on Enterprise
ISO 27001[~] FuturePost-SOC 2

Security Best Practices

For Edge Deployments

  1. Use dedicated API keys - One per location, with minimum required permissions
  2. Enable disk encryption - Protect buffered logs at rest
  3. Restrict network egress - Only allow traffic to LogFleet API endpoints
  4. Monitor agent health - Set up alerts for missed heartbeats
  5. Update regularly - We release security patches as needed

For Cloud Usage

  1. Use strong passwords - We enforce requirements, but longer is better
  2. Rotate API keys - Especially for production environments
  3. Review access regularly - Remove unused accounts
  4. Monitor unusual activity - Check dashboard for unexpected patterns

Vulnerability Reporting

Found a security issue? We take this seriously. Email: [email protected] What to include:
  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact assessment
  • Your contact information (optional)
Our commitment:
  • Acknowledge within 48 hours
  • Provide status update within 7 days
  • Credit reporters in our changelog (if desired)
We don’t currently have a formal bug bounty program, but we appreciate and acknowledge responsible disclosure.

Questions?

Security is a journey, not a destination. If you have questions about our security posture or need specific compliance documentation: