Security

Securing your IoT Edge devices

Balena ensures robust IoT security for your edge devices, protecting your fleet, data, and operations. Our secure platform supports reliable IoT fleet management and compliance with modern security standards.
Balena Trust Center

Explore our Trust Center to find detailed information about IoT security best practices, industry certifications, and how we keep your data safe.

Visit our Trust Center
Our Whitepaper

Learn about balena’s approach to IoT security in our whitepaper. Discover how we implement secure device management, data encryption, and compliance measures.

Download our Whitepaper

Are you ready for the CRA?

The Cyber Resilience Act (CRA) is the EU’s new regulation aiming to make digital products — both hardware and software — more secure by design and throughout their lifecycle. It applies to nearly every connected product on the EU market, from smart fridges to SaaS platforms.

But what exactly counts as a “product with digital elements”? What  are “essential cybersecurity requirements”? And how does this affect  manufacturers, importers, or devs working with open-source?

Learn more about the CRA

Why Trust balena with Your Next Project?

Harden Your Edge and IoT Solutions

Deploy secure, resilient devices and meet regulations like the EU's CRA with balena's end-to-end security features.

Secure from the Start
Minimalist & Hardened OS
Remotely Patch Vulnerabilities
Ensure Supply Chain Integrity
Built for Security and Compliance

Meet regulations like the EU's Cyber Resilience Act (CRA) and secure your fleet with balena's integrated security platform.

CRA-Ready SBOMs
Lifecycle Security
Secure Update & Patching
Auditable Security
Build Resilient Edge Devices

From secure boot to remote patching, use balena's foundational security to harden your devices against emerging threats.

Secure Boot & Disk Encryption
Reduced Attack Surface
Vulnerability Management
Failsafe Updates
End-to-End Edge Devices Security

Secure your entire device lifecycle—from development and supply chain to deployment and EOL—all on one platform.

Secure by Design
Supply Chain Accountability
Continuous Protection
Secure Decommissioning
OTA Updates for Enhanced Security

Safeguarding security with reliable, verifiable updates, providing consistent application and kernel updates to keep fleets protected from potential attacks.

User Access Management

Offering secure authentication methods, including credential-based login, OpenID Connect (e.g. GitHub, Google), 2FA, TOTP, and SAML-based Single Sign-On for enterprises.

Security Acknowledgments
At Balena, we welcome collaboration with external security researchers who discover vulnerabilities in our platform. We encourage researchers to responsibly introduce themselves and work with us to address issues. Please contact us at security@balena.io to report potential vulnerabilities, or for further information about our responsible security disclosure process.    
Last Updated: June 14, 2024

Name

Affiliation

Contribution

Disclosure Date

Resolution Date

Marco Jansen of Lorkeers

ThreatLabs

Marco reported a vulnerability in the 2FA recovery key management

April 22, 2024

June 14, 2024

Marco Jansen of Lorkeers

ThreatLabs

Marco reported a vulnerable gap in the 2FA setup

May 22, 2024

May 30, 2024

Santhoshkumar Chandramohan

Santhoshkumar reported a vulnerability in the email invite redirect parameter allowing malicious link injection

January 19, 2025

February 27, 2025

More on security at balena
Loading latest security related articles from our blog...

Still got questions?

Chat with our customer success team.

Contact Us