Explore our Trust Center to find detailed information about IoT security best practices, industry certifications, and how we keep your data safe.
Visit our Trust CenterLearn about balena’s approach to IoT security in our whitepaper. Discover how we implement secure device management, data encryption, and compliance measures.
Download our WhitepaperSafeguarding security with reliable, verifiable updates, providing consistent application and kernel updates to keep fleets protected from potential attacks.
Ensuring IoT compliance with regular security updates and a secure development lifecycle, aligning with ISO 27001, CRA, and more from design to deployment.
Providing fleet security with Secure Boot, Full Disk Encryption, and Cloudlink for secure remote access, enabling trusted software execution and protected device communication.
Offering secure authentication methods, including credential-based login, OpenID Connect (e.g. GitHub, Google), 2FA, TOTP, and SAML-based Single Sign-On for enterprises.
Our support accesses devices only with customer authorization. Customers can disable access by removing the balena SSH key, ensuring full control over device access.
Our builders ensure security with GPG/SHA256 base image checks, SSH-encrypted code transfers, and tightly controlled Docker registry storage for container images.
Name
Affiliation
Contribution
Disclosure Date
Resolution Date
Marco Jansen of Lorkeers
ThreatLabs
Marco reported a vulnerability in the 2FA recovery key management. We have implemented a mitigations.
April 22, 2024
June 14, 2024
Marco Jansen of Lorkeers
ThreatLabs
Marco reported a vulnerable gap in the 2FA setup. We have implemented a mitigation.
May 22, 2024
May 30, 2024