Authentication
API Key Management
Store API keys securely using Fibonacci’s keychain integration:Supported Keychain Backends
| Platform | Backend |
|---|---|
| macOS | Keychain Services |
| Windows | Windows Credential Manager |
| Linux | Secret Service (GNOME Keyring, KWallet) |
Environment-Based Authentication
For CI/CD and containerized environments:Secrets Management
Defining Secrets
Never hardcode secrets in workflow files:Setting Secrets via CLI
Secrets in Python
Secret Rotation
Encryption
Data Encryption at Rest
Encrypt sensitive data stored in memory:Encryption in Transit
All Fibonacci Cloud communications use TLS 1.3:Field-Level Encryption
Encrypt specific fields in workflow data:Access Control
Role-Based Access Control (RBAC)
Define roles and permissions for workflows:Resource-Level Permissions
API Key Scopes
Create scoped API keys with limited permissions:Audit Logging
Enable Audit Logs
Audit Log Contents
Audit logs capture:Query Audit Logs
Input Validation and Sanitization
Schema Validation
Prompt Injection Prevention
Output Filtering
Network Security
IP Allowlisting
VPC Configuration
Security Checklist
Authentication
Authentication
- API keys stored in keychain or secrets manager
- No hardcoded credentials in code or YAML
- API key rotation policy in place
- Scoped API keys for different environments
Data Protection
Data Protection
- Encryption at rest enabled for sensitive data
- TLS 1.3 for all communications
- PII handling compliant with regulations
- Data retention policies defined
Access Control
Access Control
- RBAC configured with least privilege
- Resource-level permissions defined
- Regular access reviews scheduled
- Service accounts properly scoped
Monitoring
Monitoring
- Audit logging enabled
- Security alerts configured
- Anomaly detection active
- Regular security assessments
Input/Output
Input/Output
- Input validation schemas defined
- Prompt injection protection enabled
- Output filtering configured
- Rate limiting implemented