Security Policy
ORAN handles authentication, location data, and health-adjacent service queries. We take security seriously and welcome responsible disclosure from the research community.
Reporting a vulnerability
If you discover a security vulnerability, please report it privately. Do not open a public GitHub issue for security-sensitive findings.
Scope
In scope
- ORAN web application (oranhf57ir-prod-web.azurewebsites.net)
- All public API endpoints (/api/**)
- Authentication and session management
- Data submission and search pipeline
Out of scope
- Third-party services (Azure Maps, Microsoft Entra ID, Azure infrastructure)
- Denial-of-service attacks
- Social engineering or phishing attempts against ORAN staff
- Physical security
Our commitments
48hAcknowledge all vulnerability reports within 48 hours.
14dRemediate critical vulnerabilities within 14 days of confirmation.
βNo legal action against researchers acting in good faith, following this policy, and not accessing or exfiltrating user data beyond what is necessary to demonstrate the vulnerability.
βCredit in release notes for responsibly disclosed, confirmed vulnerabilities (unless the researcher prefers anonymity).
βΉORAN does not currently operate a paid bug bounty program. All qualifying reporters receive public attribution (with consent) and our formal thanks.
Security practices
| Area | Detail |
|---|---|
| Authentication | Microsoft Entra ID via NextAuth.js. All protected routes gated server-side. Sessions fail closed if auth is misconfigured. |
| Authorization | Role-based access control (RBAC) enforced at both middleware and API handler level. Principle of least privilege. |
| Input validation | All API routes validate untrusted input with Zod before processing. No raw SQL string interpolation. |
| Encryption in transit | TLS enforced on all endpoints. HTTPS-only. No mixed content. |
| Encryption at rest | Database encrypted at rest via Azure Database for PostgreSQL Flexible Server. |
| PII in telemetry | Sentry error traces are anonymized. No user identifiers or location data in telemetry payloads. |
| Content Security Policy | CSP header applied sitewide. No CORS wildcard. Same-origin policy default. |
| Rate limiting | In-memory sliding-window rate limiting on all API routes. 429 responses include Retry-After headers. |
| Dependency management | Dependabot security alerts enabled. npm audit runs in CI on every pull request. High-severity CVEs block merging. |
Full technical control details in docs/SECURITY_PRIVACY.md. See also our Privacy Policy for telemetry and data collection details.
Past disclosures
No disclosures on record.
Machine-readable disclosure file
SECURITY.md in the repository root for automated tooling.
A security.txt file at /.well-known/security.txt is planned for a future release.