The KonBase Convention Management System prioritizes security to protect user data, inventory records, and organizational information. This document outlines our approach to security and provides guidance for reporting vulnerabilities.
We take security issues seriously. If you discover a security vulnerability within KonBase, please:
- Do not disclose the vulnerability publicly
- Email details to security@konbase.com
- Include steps to reproduce the issue
- If possible, provide suggestions for resolving the issue
We strive to acknowledge reports within 48 hours and will work to address verified vulnerabilities promptly. We appreciate your assistance in keeping KonBase secure.
- Email/password with strong password requirements
- OAuth providers (Google, Microsoft)
- Two-Factor Authentication (2FA) via TOTP
KonBase implements comprehensive role-based access control:
- Super Admin: Complete system access with administrative privileges
- Admin: Association management and user administration capabilities
- Manager: Equipment and convention management permissions
- Member: Standard user privileges
- Guest: Limited read-only access
- Enforced 2FA for administrative accounts
- Email verification requirements
- Configurable session timeouts
- Audit logging for sensitive operations
- Row Level Security (RLS) implemented via Supabase PostgreSQL policies
- Secure function-based access control for cross-table operations
- Security-definer functions to enforce permission boundaries
- Strict file size limitations (default 2MB)
- MIME type restrictions for uploaded files
- Secure bucket policies for user-specific content
- Encrypted data at rest via Supabase
- HTTPS required for all communications
- Secure token handling for authentication
As a user of KonBase, you are responsible for:
- Maintaining the confidentiality of your account credentials
- Setting up and using Two-Factor Authentication when available
- Creating strong, unique passwords
- Logging out from shared devices
- Reporting suspicious activities to your association administrator
- Audit Logging: Critical system changes are recorded with user information
- Regular Backups: Configurable backup frequency for data protection
- Session Management: Automatic session termination after configurable inactivity periods
- Permission Enforcement: Continuous validation of user permissions for sensitive operations
KonBase is committed to maintaining security best practices by:
- Regularly updating dependencies to address security vulnerabilities
- Conducting security reviews of code changes
- Implementing security improvements based on industry standards
- Responding promptly to reported security concerns
We continuously work to enhance security. Planned enhancements include:
- Advanced threat detection
- Enhanced audit capabilities
- Additional authentication options
- Expanded encryption coverage
This security policy will be updated as the KonBase platform evolves. For questions regarding this policy, please contact security@konbase.com.