πŸ•ΈοΈ Ada Research Browser

SECURITY.md
← Back

Security Hardening β€” CMMC Artifact Tracker

This document describes the security measures implemented in the CMMC Artifact Tracker.

Authentication & Session Management

CSRF Protection

XSS Prevention

Content Security Policy

default-src 'self';
script-src 'self' 'unsafe-inline';
style-src 'self' 'unsafe-inline';
img-src 'self' data: blob:;
font-src 'self';
form-action 'self';
frame-ancestors 'none';

Security Headers

All responses include: - X-Content-Type-Options: nosniff - X-Frame-Options: DENY - X-XSS-Protection: 1; mode=block - Referrer-Policy: strict-origin-when-cross-origin - Content-Security-Policy (see above) - Strict-Transport-Security (production only, when FLASK_ENV=production)

File Upload Security

SQL Injection Prevention

Secrets Management

Error Handling

Authorization

Deployment Recommendations

  1. Set FLASK_SECRET to a strong random value: python3 -c "import secrets; print(secrets.token_hex(32))"
  2. Set FLASK_ENV=production to enable secure cookies and HSTS
  3. Run behind a reverse proxy (nginx/caddy) with TLS termination
  4. Restrict UPLOAD_PATH directory permissions
  5. Back up cmmc.db regularly β€” it contains all compliance data
  6. Monitor the audit log for suspicious activity

Reporting Vulnerabilities

If you discover a security vulnerability, please report it responsibly via the project's issue tracker with the security label.