[Design Discussion] Application Security Hardening & Compliance #1980
brionmario
started this conversation in
Design
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Related Feature Issue
#1979
Problem Summary
As Thunder evolves, ensuring strong application security across all layers (frontend, SDKs, APIs, and infrastructure) is critical—especially for enterprise customers with strict security requirements.
Currently, security considerations such as CSP compliance, secure headers, dependency vulnerabilities, and runtime risks are handled in a fragmented manner. This creates inconsistencies and potential gaps in protection.
High-Level Approach
Establish a centralized security baseline for all applications and SDKs
Standardize implementation of:
Introduce SDK-level security controls (e.g., CSP nonce support, safe defaults)
Track and remediate dependency vulnerabilities continuously
Define secure integration patterns for third-party services
Enable security observability (logging, reporting, alerts)
Architecture Overview
Components:
Frontend Applications (React / JSP / etc.)
SDK Layer
Backend / API Layer
Security Tooling & Monitoring
Security Considerations
1. Content Security Policy (CSP)
unsafe-inlineandunsafe-eval2. Secure HTTP Headers
Strict-Transport-SecurityX-Content-Type-OptionsX-Frame-Options/frame-ancestorsReferrer-PolicyPermissions-Policy3. Dependency Security
4. Runtime Risks
5. Data Protection
Impacted Areas
Alternatives Considered
Alternative 1: Handle security per team/application
Alternative 2: Enforce strict policies without SDK support
Alternative 3: Focus only on backend security
Questions for Community Input
Beta Was this translation helpful? Give feedback.
All reactions