Skip to content

ApprovalFlow Security Policy

OwnerFlowdence Security and Engineering
Applies to appApprovalFlow for Confluence
Review cadenceQuarterly and after any significant security event
StatusBaseline policy
  • Source control with reviewed changes via pull requests and decision logs.
  • All resolver mutations enforce server-side authorization checks (owner-or-admin and space-admin guards).
  • Production release gates include forge lint, unit tests, and Playwright end-to-end verification.
  • Production claims are traceable to implementation code.
  • CI quality gate must pass on release commit.
  • App permissions are scoped to minimum required capability (see manifest scopes).
  • Space-level admin checks are required for all workflow mutation actions.
  • Workflow ownership RBAC enforces that only workflow owners or space admins can mutate workflows.
  • Decision actions validate approver eligibility for the active step.
  • Sensitive operations are denied for unauthorized users with consistent error handling.
  • License enforcement is strict in production via defineLicensedResolver.
  • No secrets are stored in source code.
  • ApprovalFlow does not require external credentials; all data is stored in Forge Key-Value Storage.
  • No external egress is declared in the manifest.
  • Structured logging via dedicated logger utility with redaction for sensitive data.
  • Production logging avoids user-generated content and nonessential identifiers.
  • Resolver timing snapshots for selected hot resolvers support performance monitoring.
  • Monitoring and alerting responders are assigned per operational readiness plan.
  • Security issues are triaged and remediated by severity.
  • Marketplace security requirement timelines are treated as release constraints.
  • Dependency updates and vulnerability patches are tracked through standard release process.
  • Incident triage, escalation, and communication runbooks are maintained.
  • Post-incident review and corrective actions are tracked to closure.
  • Security events are managed per security policy and operational runbooks.
  • Data stored in Forge hosted storage with versioned, additive key design (v1 keyspace).
  • Optimistic concurrency prevents lost updates under concurrent approval decisions.
  • Retention cleanup functions exist for approval and audit artifacts.
  • Audit write fanout to multiple indexes supports compliance without exposing raw data.

ApprovalFlow protects workflow governance data through server-side resolver boundaries. Workflow creation, workflow updates, assignment changes, and reset operations require space-admin or workflow-owner checks before storage writes occur. Approval and rejection actions validate that the acting user is assigned to the current workflow step.

Because ApprovalFlow has no external egress and no customer-managed secrets, the primary security concerns are authorization, audit integrity, retention cleanup, and safe handling of Confluence page metadata. Operational logging is designed to identify affected site, space, page, workflow, and record IDs without logging full page body content.

  • Contact: security@flowdence.io
  • Report format: include impact, reproduction steps, and affected environments.

This app-specific policy is read together with the shared Flowdence baseline: