{"_id":"567aff7b3241c20d00b73038","parentDoc":null,"project":"5633ebff7e9e880d00af1a53","__v":1,"user":"5633ec9b35355017003ca3f2","version":{"_id":"5633ec007e9e880d00af1a56","project":"5633ebff7e9e880d00af1a53","__v":16,"createdAt":"2015-10-30T22:15:28.105Z","releaseDate":"2015-10-30T22:15:28.105Z","categories":["5633ec007e9e880d00af1a57","5633f072737ea01700ea329d","5637a37d0704070d00f06cf4","5637cf4e7ca5de0d00286aeb","564503082c74cf1900da48b4","564503cb7f1fff210078e70a","567af26cb56bac0d0019d87d","567afeb8802b2b17005ddea0","567aff47802b2b17005ddea1","567b0005802b2b17005ddea3","568adfffcbd4ca0d00aebf7e","56ba80078cf7c9210009673e","574d127f6f075519007da3d0","574fde60aef76a0e00840927","57a22ba6cd51b22d00f623a0","5a062c15a66ae1001a3f5b09"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"category":{"_id":"567aff47802b2b17005ddea1","pages":["567aff537c40060d005603e3","567aff7b3241c20d00b73038","5693bcb273f48f0d0075c917","569932cf3da4370d009d20e6","56a82ae72036420d002d21ba","56df78581fc20d190018d3f4","56e9d31ddd327c0e000ef1b6"],"project":"5633ebff7e9e880d00af1a53","version":"5633ec007e9e880d00af1a56","__v":7,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-12-23T20:08:39.453Z","from_sync":false,"order":8,"slug":"faq","title":"FAQ"},"updates":[],"next":{"pages":[],"description":""},"createdAt":"2015-12-23T20:09:31.299Z","link_external":false,"link_url":"","githubsync":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":1,"body":"## Security\n\nWith Bonsai, we take security very seriously. We take industry standard precautions against data leaks\n\n### How does Bonsai ensure security?\n\nAll clusters are provisioned with a randomly-generated username and password. All read/write requests to a cluster require the authentication credentials to be present, or it will return an HTTP 401 response. This discourages unauthorized access to your data.\n\nAdditionally, all clusters are accessible over SSL/TLS by default. This allows users to encrypt their communications between their app and cluster, keeping data safe in transmission.\n\n\n### Does Bonsai offer IP filtering or other whitelisting abilities?\n\nAt the moment, we do not support whitelisting. However it is something we're considering for future development. If you'd like to see this added, feel free to [ping us](mailto:support:::at:::onemorecloud.com) and let us know your use case.","excerpt":"","slug":"security","type":"basic","title":"Security"}
## Security With Bonsai, we take security very seriously. We take industry standard precautions against data leaks ### How does Bonsai ensure security? All clusters are provisioned with a randomly-generated username and password. All read/write requests to a cluster require the authentication credentials to be present, or it will return an HTTP 401 response. This discourages unauthorized access to your data. Additionally, all clusters are accessible over SSL/TLS by default. This allows users to encrypt their communications between their app and cluster, keeping data safe in transmission. ### Does Bonsai offer IP filtering or other whitelisting abilities? At the moment, we do not support whitelisting. However it is something we're considering for future development. If you'd like to see this added, feel free to [ping us](mailto:support@onemorecloud.com) and let us know your use case.