Security First, Always

Your Data.
Always Safe.

Security isn't an afterthought at EazeMyAPI. Every request is authenticated, every connection encrypted, and every piece of data protected by design.

Core Principles

Built secure from day one

Three pillars guide every decision we make about how your data is stored, transmitted, and accessed.

Encrypted by Default

All data in transit is protected with TLS 1.2+. Data at rest is encrypted using AES-256. No exceptions.

Access Controlled

Every API request requires a scoped signature key. No public endpoints, no anonymous access. Your data stays yours.

Isolated Per Project

Each project gets its own isolated database and API namespace. One project can never access another's data.

Infrastructure

How we protect your data

From the moment you make a request to the moment data is stored, multiple layers of security are in place.

1

Request hits our edge

Every inbound request passes through TLS termination at the edge. Unencrypted connections are rejected automatically.

2

Signature key is verified

The X-API-SIGNATURE header is validated against your project's secret. Invalid or missing keys are rejected with a 401.

3

Query is sandboxed and executed

Requests are routed to your project's isolated database. Parameterized queries prevent SQL injection at the framework level.

4

Response is returned over TLS

Data flows back to your client fully encrypted. We never log request bodies or response payloads in plain text.

What We Do

Security practices in place

A non-exhaustive list of the measures we maintain to keep your projects and data secure.

TLS 1.2+ on all endpoints

All API traffic is encrypted in transit. HTTP connections are automatically redirected to HTTPS.

Scoped API signature keys

Each project has a unique secret key. Keys can be rotated from the dashboard at any time.

SQL injection prevention

All queries use parameterized statements. User-supplied values are never interpolated directly into SQL.

Project-level data isolation

Every project runs in its own isolated namespace. Cross-project data access is architecturally impossible.

Password hashing

Fields marked as PASSWORD type are automatically hashed using bcrypt before storage. We never store plain text passwords.

Rate limiting

All endpoints are rate-limited per project to prevent abuse and protect against brute-force attacks.

Audit logging

All API activity is logged with timestamps, IP addresses, and status codes for your review in the dashboard.

HTTPS-only cookies

Session tokens are always set with Secure and HttpOnly flags, preventing access from JavaScript and ensuring they are never sent over unencrypted connections.

Vulnerability Reporting

Responsible disclosure

Found a security issue? We take every report seriously and will work with you to resolve it quickly.

Report a vulnerability

If you discover a security vulnerability in EazeMyAPI, please report it responsibly. Do not disclose it publicly until we have had a chance to address it. We aim to respond to all reports within 48 hours and will keep you updated on our progress.

Common Questions

Security FAQ

Where is my data stored?
Your data is stored on managed cloud infrastructure. Each project is isolated in its own database environment. We do not store data on shared or multi-tenant tables.
Can EazeMyAPI staff read my data?
Access to customer data by EazeMyAPI staff is strictly limited to what is required for platform operations and support, and only with explicit authorization. All access is logged.
How do I keep my API key secure?
Never expose your X-API-SIGNATURE key in frontend code. Store it in environment variables and proxy requests through a serverless function (e.g. a Vercel API route). You can rotate your key anytime from the project settings.
What happens if I rotate my API key?
The old key is immediately invalidated. Any requests using the old key will return a 401 Unauthorized response. Make sure to update your environment variables before rotating.
Do you sell or share my data with third parties?
No. We do not sell, rent, or share your data with third parties. Your data belongs to you. See our Privacy Policy for full details.

Build with confidence.

Security is built in, not bolted on. Start building your backend today knowing your data is protected at every layer.