Security Best Practices
Protect your app, your users, and your data from day one.
Security Is Built In by Default
Every app built on Imagine.bo comes with security best practices applied automatically. You don't need to configure these — they are part of every deployment:
- SSL/HTTPS on all deployed apps — all data in transit is encrypted.
- Data encryption at rest and in transit — your database and API communications are secured.
- Secure authentication and session management — login flows are generated with industry-standard security.
- Role-Based Access Control (RBAC) — user roles and permissions are enforced at the data layer, not just the UI.
- GDPR and SOC 2 readiness foundations — compliance best practices are baked into the deployment architecture.
Define Access Control in Your Prompts
The most effective security measure is specifying correct permissions before the app is generated. Retrofitting access control is harder than building it in from the start.
In every project prompt, define:
- Which user roles exist.
- What data each role can read, write, edit, and delete.
- Which pages or API endpoints are restricted by role.
Example:
There are three roles: Guest (can only view public listings), Member (can create and edit their own listings), and Admin (can edit or delete any listing and manage users). Guests cannot access /dashboard or /settings.
Protect Sensitive Data Fields
When building apps that handle personal information (emails, phone numbers, payment details, health data):
- Prompt Imagine.bo to mask or hide sensitive fields from roles that don't need them.
- Avoid displaying raw sensitive data in admin dashboards unless necessary.
- For payment processing, always use the Assign a Developer feature — payment integrations involve compliance requirements (PCI-DSS) that benefit from human engineering oversight.
Use Strong Authentication Practices
Imagine.bo generates secure authentication out of the box. Reinforce this with good practices in your app design:
- Enable email verification on signup for user-facing apps:
Require email verification before a user can access their dashboard. - Use password reset flows — prompt Imagine.bo to include a "forgot password" flow with email-based reset.
- For sensitive or enterprise apps, consider specifying two-factor authentication (2FA) as a requirement in your initial prompt.
Review Permissions Before Going Live
Before deploying publicly, manually test your app with accounts in each user role:
- Can a Guest access pages they shouldn't?
- Can a standard Member modify or delete another user's data?
- Can unauthenticated users reach authenticated routes by typing URLs directly?
If you find a permissions issue, describe it in a follow-up prompt or assign it to a developer for precise correction.
Keep Third-Party Integrations Secure
When adding third-party APIs (payment providers, analytics tools, external services):
- Never expose secret API keys in frontend code. Use the Assign a Developer feature for integrations that require secure key management.
- Limit the permissions of any API key to only what the integration requires.
- Regularly rotate keys for sensitive services.
Data Ownership and Export
You own your data entirely. Imagine.bo provides easy export capabilities so you are never locked into the platform. For compliance-sensitive projects:
- Export your data regularly as a backup.
- Document what personal data your app collects — this is required for GDPR compliance.
- Use the Assign a Developer feature if you need to implement a formal data deletion or data export workflow for end users (a GDPR "right to erasure" feature).
FAQ
every app includes SSL/HTTPS on all deployed apps, data encryption at rest and in transit, secure authentication and session management, Role-Based Access Control RBAC enforced at the data layer, and GDPR and SOC 2 readiness foundations baked into the deployment architecture
in every project prompt define which user roles exist, what data each role can read write edit and delete, and which pages or API endpoints are restricted by role — specifying correct permissions before the app is generated is more effective than retrofitting access control later
prompt Imagine.bo to mask or hide sensitive fields from roles that do not need them, avoid displaying raw sensitive data in admin dashboards unless necessary, and for payment processing always use the Assign a Developer feature as payment integrations involve PCI-DSS compliance requirements that benefit from human engineering oversight
enable email verification on signup, use password reset flows with email-based reset, and for sensitive or enterprise apps consider specifying two-factor authentication 2FA as a requirement in your initial prompt — Imagine.bo generates secure authentication out of the box
manually test your app with accounts in each user role before deploying publicly — check if a Guest can access pages they should not, if a standard Member can modify another user's data, and if unauthenticated users can reach authenticated routes by typing URLs directly
never expose secret API keys in frontend code and use the Assign a Developer feature for integrations that require secure key management, limit the permissions of any API key to only what the integration requires, and regularly rotate keys for sensitive services
you own your data entirely and Imagine.bo provides easy export capabilities so you are never locked into the platform, for compliance-sensitive projects export your data regularly, document what personal data your app collects for GDPR compliance, and use the Assign a Developer feature to implement a formal data deletion or export workflow for a GDPR right to erasure feature

