This document outlines the security features and practices available in Contentstack Launch, along with the shared responsibility model for applications deployed on the platform. It explains how Launch helps secure applications at the platform level and what responsibilities apply to customer-managed application code and configurations.
Contentstack Launch follows a layered security model designed to protect applications at multiple levels, including:
This approach ensures application availability, performance, and protection against common security threats.
A Distributed Denial of Service (DDoS) attack is a type of malicious activity that attempts to make an application or service unavailable by overwhelming it with traffic from multiple sources. The objective of a DDoS attack is not to gain unauthorized access, but to exhaust system resources so legitimate users are unable to access the application.
Unlike a single-source denial-of-service (DoS) attack, DDoS attacks are distributed, meaning the traffic originates from many systems simultaneously. These systems are often compromised devices that are coordinated to send requests at scale, making the traffic difficult to block using simple filtering techniques.
DDoS attacks typically target different layers of the network and application stack, depending on the resources they aim to exhaust.
Network-Layer Attacks (Layer 3/4)
Network-layer attacks focus on overwhelming the underlying network infrastructure.
These attacks typically attempt to:
Such attacks generate large volumes of traffic and can impact availability before requests reach the application logic.
Application-Layer Attacks (Layer 7)
Application-layer attacks target the application itself by sending large numbers of requests that may appear legitimate.
These attacks typically attempt to:
Since the traffic often resembles normal user behavior, application-layer attacks can be more difficult to detect.
All applications hosted on Contentstack Launch are protected by a CDN layer, which provides automatic detection and mitigation of DDoS attacks.
Key characteristics:
This ensures malicious traffic is absorbed and filtered at the network edge, helping maintain application availability.
When an Application Layer DDoS attack is detected:
Note: A notification is sent when a DDoS attack starts, but not when it ends. Ensure you monitor the system manually to confirm when the attack has stopped.
This approach gives users visibility into security incidents without generating excessive notifications.
Additional Resource: Learn more about managing notifications.
While DDoS mitigation is handled automatically, users can further strengthen application resilience using Launch-native capabilities:
Contentstack Launch supports IP-based access control using Edge Functions, allowing you to restrict access to applications based on IP address rules.
This is commonly used to:
IP-based rules are evaluated at the edge, ensuring requests are filtered before reaching the application runtime.
Applications hosted on Launch benefit from CDN-level bot detection and mitigation, which helps reduce unwanted automated traffic. Additionally, Launch enables the blocking or controlling of bot traffic, including AI crawlers, using Edge Functions.
This helps protect applications from:
Contentstack Launch automatically includes geolocation headers with incoming requests, providing geographic information such as country, region, and city based on the visitor’s IP address.
These headers can be used in Edge Functions or application logic to apply geolocation-based access and routing controls, such as allowing or blocking traffic from specific countries or regions.
Geolocation rules are evaluated before requests reach the application runtime, helping enforce region-specific access policies and reduce unwanted traffic.
Contentstack Launch supports password protection for environments, allowing you to restrict access to specific deployments using a password prompt.
This feature is commonly used to:
Password protection operates at the edge, ensuring requests are validated before reaching the application runtime. When accessing a protected environment, users are prompted to enter a password before content is served.
Password protection is configured per environment and can be enabled or disabled through the Launch dashboard.
In addition, Launch allows you to apply password protection to specific domains within an environment using Edge Functions. This enables more granular access control when an environment is associated with multiple domains.
Additional Resource: Learn more about password protection with an example.
Contentstack Launch supports the enforcement of Content Security Policy (CSP) to help mitigate client-side security risks such as cross-site scripting (XSS) and data injection attacks.
CSP allows you to control:
CSP rules should be configured based on application requirements and third-party integrations.
Additional Resource: Learn more about Content Security Policy with an example.
When a custom domain is removed from a Launch environment, associated DNS records should also be removed from your DNS provider.
After deleting a domain in Launch, remove all related DNS records (such as A, CNAME, ALIAS, or TXT records) from your DNS provider to prevent them from inadvertently pointing to your application or exposing unused endpoints.
Proper DNS housekeeping helps reduce the risk of domain hijacking and prevents unintended traffic from being routed to stale or deprecated resources.
Contentstack Launch provides secure, encrypted connections for all deployments to protect data in transit.
Launch serves all deployed applications over HTTPS by default, using industry-standard encryption protocols to safeguard end-user data and ensure privacy. Secure certificates are provisioned and managed automatically for custom and default domains.
Launch automatically redirects all incoming HTTP requests to HTTPS using permanent redirect status codes. This redirect is enforced and cannot be disabled, providing consistent enforcement of encrypted connections across environments.
Launch supports modern versions of the Transport Layer Security (TLS) protocol to help ensure data integrity and confidentiality during transmission, including:
This helps protect applications from network-based eavesdropping and man-in-the-middle attacks, supporting secure delivery and compliance with modern security standards.
Additional Resource: Learn more about traffic encryption in Launch.
Contentstack Launch manages the security of the underlying platform, including:
Customers are responsible for addressing vulnerabilities related to:
Note: Any vulnerabilities identified in the customer-managed code must be fixed and redeployed by the user.
Launch provides secure management of environment variables at the environment level.
Best practices:
Note: Any change to environment variables requires a new deployment to take effect.
Contentstack Launch provides a hosting platform with security enabled by default:
By combining these platform capabilities with secure development practices, users can deploy and operate applications using documented platform and development controls on Launch.