Security Overview
How we secure ManageN8N across infrastructure, data, and operations.
Security Overview
Last Updated: December 10, 2025
Our Commitment to Security
At ManageN8N, security is not an afterthought; it's foundational to everything we do. We understand that you're trusting us with your automation infrastructure, and we take that responsibility seriously.
This page provides an overview of how we protect your data and our platform.
Security at a Glance
| Category | Implementation |
|---|---|
| Encryption | AES-256 at rest, TLS 1.2+ in transit |
| Authentication | JWT tokens + Two-Factor Authentication (TOTP) |
| Infrastructure | CloudFlare WAF, DDoS protection |
| Monitoring | 24/7 error monitoring, uptime tracking |
| Compliance | GDPR-aligned, SOC 2 (planned) |
Infrastructure Security
Cloud Infrastructure
- Provider: DigitalOcean (SOC 2, ISO 27001 certified)
- Region: US East with automated backups
- Network: Private networking, firewall rules
- Updates: Regular security patching
Edge Security (CloudFlare)
- Web Application Firewall (WAF) - OWASP Core Rule Set
- DDoS Protection - Layer 3/4/7 mitigation
- Bot Protection - Automated threat blocking
- TLS Encryption - All traffic encrypted
Container Security
- Docker containers with minimal attack surface
- No external port exposure (reverse proxy only)
- Regular image updates
- Network isolation between services
Data Protection
Encryption
| Data Type | Encryption Method |
|---|---|
| Passwords | bcrypt (one-way hash) |
| SSH Keys | AES-256-GCM + PBKDF2 |
| Credentials | AES-256-CBC |
| TOTP Secrets | AES-256-CBC |
| Database | TLS in transit, encrypted at rest |
| All Traffic | TLS 1.2+ |
What We Encrypt
- All sensitive credentials and secrets
- SSH keys stored for instance access
- API tokens and access keys
- Two-factor authentication secrets
- Backup codes (hashed)
What We Don't Store
- Full payment card numbers (handled by Stripe)
- Plaintext passwords
- Your n8n workflow execution data
Authentication & Access Control
User Authentication
- Password Policy
- Minimum 8 characters
- Requires uppercase, lowercase, number, special character
- Common passwords blocked
- Sequential patterns blocked
- Two-Factor Authentication
- TOTP-based (works with Google Authenticator, Authy, etc.)
- 10 one-time backup codes
- Optional for all users (highly recommended)
- Session Security
- Short-lived access tokens (15 minutes)
- Secure refresh token mechanism
- Automatic session expiration
Rate Limiting
| Endpoint | Limit |
|---|---|
| Authentication | 10 requests / 15 minutes |
| General API | 5,000 requests / 15 minutes |
| Agent Communication | Per-instance limits |
Protection against brute force attacks and API abuse.
Application Security
Secure Development
- Input Validation: All inputs validated with Zod schemas
- SQL Injection: Prevented via Prisma ORM parameterized queries
- XSS Prevention: Content sanitization, secure headers
- CSRF Protection: Origin validation, secure cookies
Security Headers
Strict-Transport-Security: max-age=15552000; includeSubDomains
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
Content-Security-Policy: [configured]
Referrer-Policy: strict-origin-when-cross-origin
Dependency Management
- Regular vulnerability scanning
- Prompt patching of security issues
- Minimal dependency footprint
Monitoring & Incident Response
Real-Time Monitoring
- Error Tracking: Sentry monitors all services
- Uptime Monitoring: BetterStack with instant alerts
- Performance Tracking: Response time and throughput
- Security Alerts: CloudFlare threat intelligence
Audit Logging
We log security-relevant events including: login attempts (successful and failed), password changes, two-factor authentication changes, administrative actions, API key operations.
Incident Response
- Documented incident response procedures
- 24/7 alerting for critical issues
- Defined escalation paths
- Post-incident reviews
Data Privacy
Data Minimization
We collect only what's necessary to provide the service:
- Account information (email, name)
- Service configuration
- Usage metrics for service improvement
Data Location
- Primary processing: United States
- International transfers: Standard Contractual Clauses for EU data
Your Rights
- Access: Request your data
- Correction: Update inaccurate data
- Deletion: Delete your account and data
- Export: Download your data
See our Privacy Policy for complete details.
Third-Party Security
Vetted Providers
All third-party services are selected based on security certifications (SOC 2, ISO 27001), data protection agreements, privacy compliance, and reputation.
Key Providers
| Provider | Purpose | Certifications |
|---|---|---|
| DigitalOcean | Infrastructure | SOC 2, ISO 27001 |
| CloudFlare | Security/CDN | SOC 2, ISO 27001, PCI DSS |
| Stripe | Payments | PCI DSS Level 1 |
| Sentry | Monitoring | SOC 2 |
See our Third-Party Services Policy for complete details.
Agent Security
For customers using Bring Your Own Server (BYOS):
- Secure Communication: HTTPS only
- API Key Authentication: Unique keys per instance
- Limited Permissions: Agent only manages n8n service
- No Data Access: Agent doesn't access workflow content
- Verified Updates: Checksums for all packages
Compliance
Current
- GDPR: Data protection measures in place
- Security Best Practices: OWASP, CIS frameworks
Planned
- SOC 2 Type II: Audit planned
- Additional Certifications: Based on customer needs
Vulnerability Disclosure
Reporting Security Issues
If you discover a security vulnerability, please report it responsibly:
Email: security@managen8n.com
We appreciate security researchers who report issues privately before public disclosure, provide detailed information to help us reproduce, and allow reasonable time for remediation.
Security.txt
Our security contact information is available at: https://api.managen8n.com/.well-known/security.txt
What You Can Do
Protect Your Account
- Use a strong, unique password
- Enable two-factor authentication
- Keep your email address current
- Review account activity regularly
- Report suspicious activity immediately
Protect Your Integrations
- Secure your API keys
- Rotate credentials regularly
- Use least-privilege access
- Monitor your instance health
Security Updates
We continuously improve our security posture. Recent enhancements include:
- Two-Factor Authentication (TOTP)
- CloudFlare WAF with OWASP rules
- Enhanced password policy
- Comprehensive audit logging
- Real-time error and log monitoring
- Uptime monitoring with heartbeats
Questions?
Security Questions: security@managen8n.com
Privacy Questions: privacy@managen8n.com
General Support: support@managen8n.com