Security
Security controls designed for SP-API and restricted-data handling.
FireFeed implements the security controls expected of a Selling Partner API integration, with particular care for restricted data such as recipient and shipping information. This page summarizes the main controls. The detailed implementation is reviewed during seller onboarding and security assessments.
Network protection
- Production databases are not exposed to the public internet. They are reachable only from the application network.
- Access to internal services is restricted via private networking, security groups and firewall rules.
- Only the ports strictly required for the service are exposed externally.
- Production, staging and development run in separated environments with separated credentials and data.
- Public endpoints are protected by rate limiting and abuse controls; a Web Application Firewall layer is used in front of HTTP entry points.
- Administrative access is restricted to authorized operators on hardened workstations and over secured channels.
Encryption in transit
- All HTTP traffic is served over HTTPS with valid TLS certificates.
- HTTP requests are redirected to HTTPS.
- HSTS is enabled on production hostnames.
- Internal service-to-service communication uses TLS or runs over a private network.
- SP-API calls are made exclusively over HTTPS and follow Amazon's authentication and signing requirements.
Encryption at rest
- Production storage volumes are encrypted at rest.
- Sensitive fields (including Amazon recipient and shipping information) are encrypted at the application layer using AES-256.
- Credentials, SP-API tokens and integration secrets are stored in a managed secret store, not in the application database in plain form.
- Encryption keys are managed by a key-management facility, with restricted access and audited usage.
- Key rotation is performed on a documented cadence and on suspected compromise.
Access control
- Each operator and team member has an individual user account; shared accounts are not permitted.
- Role-based access control (RBAC) enforces the principle of least privilege.
- Multi-factor authentication is required for all administrative accounts and for access to systems handling Amazon Information.
- Access to production systems is reviewed periodically; access is revoked on role change or termination.
- All access events are logged and reviewed.
Credentials & secrets management
- No secrets are committed to source repositories. Repositories are scanned for accidental secret exposure.
- Secrets are injected at runtime from environment variables backed by a managed secret store.
- Secrets and tokens are rotated on a defined schedule and on any suspected compromise.
- Secrets are masked in application logs and error reports.
- Password policy requires sufficient length and complexity; reuse of breached passwords is blocked where the underlying system supports it.
Logging & monitoring
- Centralized application and security logs, with structured events for auditability.
- Audit log of access to systems handling Amazon Information.
- Alerting on suspicious authentication, configuration changes, and abnormal access patterns.
- Periodic review of security logs by the operations team.
- Log retention is set to support investigations; retention is at least 12 months for security-relevant logs.
Vulnerability management
- Automated dependency scanning on every build, with alerts on known vulnerabilities.
- Static code analysis on the main branch and on pull requests.
- Operating system and base image patching as part of the regular build cycle.
- Critical vulnerabilities are remediated within 7 days; high-severity vulnerabilities within 30 days, in line with severity-based timelines.
- Changes are validated in staging before deployment to production.
- Pull requests require code review before merge.
Incident response
- Documented incident response procedure covering detection, containment, analysis, recovery and post-mortem.
- Defined roles and responsibilities for security incidents.
- For incidents involving Amazon Information, FireFeed will notify Amazon within 24 hours of confirmed detection, in line with Amazon's Data Protection Policy.
- Affected sellers and data subjects are notified in line with applicable obligations.
- Each incident is followed by a post-mortem and a tracked set of corrective actions.
Backup & restore
- Encrypted backups of production data on a regular schedule.
- Backup integrity is monitored.
- Restore drills are performed periodically to validate the recovery procedure.
- Recovery time and recovery point objectives are defined and reviewed.
For security questions, vulnerability reports or incident notifications involving FireFeed or Amazon Information, contact security@fire-feed.com.