Skip to content

Commit

Permalink
Note about cache-control: private in security docs, refs #92
Browse files Browse the repository at this point in the history
  • Loading branch information
simonw committed May 10, 2021
1 parent e6e36d2 commit 9edf612
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions docs/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,3 +10,4 @@ Configured correctly, Django SQL Dashboard uses a number of measures to keep you
- Your allow-list of tables should not include tables with sensitive information. Django's auth_user table contains password hashes, and the django_session table contains user session information. Neither should be exposed using this tool.
- Access to the dashboard is controlled by Django's permissions system, which means you can limit access to trusted team members.
- SQL queries can be passed to the dashboard using a ?sql= query string parameter - but this parameter needs to be signed before it will be executed. This should prevent attempts to trick you into executing malevolent SQL queries by sending you crafted links - while still allowing your team to create links to queries that can be securely shared.
- Any time a user views a dashboard page while logged in, `Cache-Control: private` is set on the response to ensure the authenticated dashboard will not be stored in any intermediary HTTP caches

0 comments on commit 9edf612

Please sign in to comment.