Security
EnvFly CLI is built with security as a top priority. This page explains the security features and best practices for keeping your environment variables safe.Encryption
Client-Side Encryption
All environment variables are encrypted before they leave your machine. EnvFly CLI uses industry-standard encryption to ensure your secrets remain private.Zero-Knowledge Architecture
EnvFly CLI follows a zero-knowledge approach:- Your encryption key never leaves your machine
- Storage providers only see encrypted data
- Even EnvFly servers cannot decrypt your secrets
- You control access to your data
Key Management
Encryption Key Storage
For different storage providers, keys are managed differently:Git Repository
- Store your encryption key securely
- Consider using a password manager
- Never commit the key to version control
- Share the key securely with team members
Cloud Providers (AWS, Azure, GCP)
- Leverages cloud provider security
- IAM/role-based access control
- Automatic key rotation
- Audit logging
EnvFly Cloud Service
- API keys stored in system keychain
- Automatic key validation
- Secure token refresh
Access Control
Role-Based Permissions
When using EnvFly Cloud Service, you can assign different roles to team members:Environment-Level Access
Granular permissions per environment:Cross-Team Sharing
Share environments between teams with controlled access:Audit Logging
Comprehensive Audit Trail
All actions are logged for security and compliance:- Environment pushes and pulls
- Team member invitations
- Permission changes
- Access attempts
- Configuration modifications
Audit Log Details
Each audit entry includes:Best Practices
Encryption Key Management
Use Strong Keys
Use Strong Keys
Generate strong, random encryption keys:
bash # Generate a strong key openssl rand -base64 32
Secure Key Storage
Secure Key Storage
Store encryption keys securely: - Use a password manager - Never store in
plain text files - Don’t commit to version control - Share securely with
team members
Regular Key Rotation
Regular Key Rotation
Rotate encryption keys periodically: - Generate new keys every 6-12 months -
Re-encrypt all environments with new keys - Update team members with new
keys
Access Control
Principle of Least Privilege
Principle of Least Privilege
Grant only necessary permissions: - Start with read-only access - Escalate
permissions as needed - Regularly review and revoke unused access
Team Management
Team Management
Manage team membership carefully: - Remove former employees immediately -
Use invite codes for new members - Monitor team access regularly
Environment Isolation
Environment Isolation
Separate environments by sensitivity: - Production: Restricted access -
Staging: Developer access - Development: Open access
Network Security
Use HTTPS
Use HTTPS
Always use HTTPS for API communication: - EnvFly CLI enforces HTTPS - Verify
SSL certificates - Use corporate proxies if required
Network Restrictions
Network Restrictions
Restrict network access where possible: - Use VPN for remote access -
Configure firewall rules - Monitor network traffic
API Rate Limiting
API Rate Limiting
Be aware of rate limits: - Respect API rate limits - Implement exponential
backoff - Monitor for unusual activity
Compliance
Security Standards
EnvFly CLI helps you meet various compliance requirements:Security Features Summary
Feature | Description | Benefit |
---|---|---|
Client-side encryption | AES-256-GCM encryption | Data never leaves unencrypted |
Zero-knowledge | Server never sees plaintext | Complete privacy |
Role-based access | Granular permissions | Controlled access |
Audit logging | Complete activity trail | Compliance & security |
Key management | Secure key storage | Key security |
Network security | HTTPS enforcement | Secure communication |
Security Checklist
Before using EnvFly CLI in production:- Generate strong encryption keys
- Configure secure key storage
- Set up role-based access control
- Enable audit logging
- Configure network security
- Train team on security practices
- Set up monitoring and alerting
- Create incident response plan
- Regular security reviews
- Key rotation schedule
Reporting Security Issues
If you discover a security vulnerability:- Do not create a public GitHub issue
- Email security@envfly.io with details
- Include steps to reproduce the issue
- Provide affected versions and platforms