Zum Hauptinhalt springen

Sicherheitsuebersicht

FeedbackPulse SaaS is built with security as a top priority. This page documents all security measures in place.


Sicherheit Layersโ€‹

Transport Sicherheitโ€‹

FeatureImplementation
HTTPSEnforced via SESSION_SECURE_COOKIE=true and redirect middleware
HSTSStrict-Transport-Sicherheit: max-age=31536000; includeSubDomains
Sicherheit HeadersApplied by SicherheitHeaders middleware on every response

Authenticationโ€‹

FeatureImplementation
Password HashingBcrypt with 12 rounds
Two-Factor AuthTOTP via authenticator apps (Google Authenticator, Authy)
Social LoginOAuth2 with Google and GitHub
Email VerificationRequired before accessing dashboard
Signed URLsUsed for team invitations (7-day expiry)
Session EncryptionSessions encrypted at rest

Authorizationโ€‹

FeatureImplementation
Role-Based Access4 roles: superadmin, tenant_admin, tenant_staff, customer
Middleware GuardsRoute-level access control
Tenant IsolationGlobal scope prevents cross-tenant data access
Plan-Based GatesFunktionen locked behind subscription plan

Application Sicherheitโ€‹

FeatureImplementation
CSRF ProtectionLaravel CSRF tokens on all forms (except webhooks/widget)
XSS PreventionBlade {{ }} auto-escaping
SQL InjectionEloquent parameterized queries
Mass AssignmentModel $fillable whitelisting
Rate LimitingPer-route throttling (5-120 req/min)

API Sicherheitโ€‹

FeatureImplementation
API Key HashingSHA256 hashed storage
Per-Tenant Rate Limits60 requests/minute per tenant
Key RotationRevoke old keys, create new ones
Last Used Trackinglast_used_at timestamp updated on every use

Data Sicherheitโ€‹

FeatureImplementation
Sensitive Data EncryptionPlatform settings encrypted at rest
GDPR ComplianceData export, deletion, anonymization tools
Data RetentionAuto-delete old data per plan retention policy
Audit LoggingEvery significant action tracked with IP and user agent
CSV Injection PreventionFormula characters sanitized in exports

Webhook Sicherheitโ€‹

FeatureImplementation
HMAC SignaturesSHA256 signatures on outbound webhooks
SSRF ProtectionBlocks localhost, private IPs in webhook URLs
Stripe VerificationWebhook signature verification
Event DeduplicationPrevents double-processing via event ID tracking

HTTP Sicherheit Headersโ€‹

Applied by the SicherheitHeaders middleware:

X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains
Referrer-Policy: strict-origin-when-cross-origin
Content-Security-Policy: [configured per deployment]

Naechste Schritteโ€‹