How to Secure Fly.io
Step-by-step guide to securing your Fly.io edge deployment and protecting your services.
Fly.io Security Context
Fly.io provides global edge deployments with Private Networking and fly secrets for secure configuration. Key security areas include secrets management, multi-region encryption, and network isolation.
Security Checklist
Use fly secrets
CriticalStore all sensitive data using fly secrets, not environment variables in fly.toml.
Configure Private Networking
CriticalUse Fly's private networking for internal service communication.
Enable multi-region encryption
Configure encryption for data in transit between regions.
Review global edge security
Understand security implications of edge deployments.
Configure health checks
Set up health checks for all services.
Enable HTTPS
Verify HTTPS is enabled and configured correctly.
Set up team permissions
Configure appropriate access for team members.
Review volume encryption
Enable encryption for persistent volumes.
Configure Postgres security
Set up managed Postgres with proper access controls.
Review machine sizing
Set appropriate resource limits.
Enable audit logging
Track deployments and changes.
Configure auto-scaling
Set appropriate scaling policies.
Review proxy settings
Configure Fly Proxy appropriately.
Set up backups
Configure volume and database backups.
Configure monitoring
Set up Fly Metrics and alerts.
Run security scan
Use VibeEval to scan your deployed application.
Related Resources
Automate Your Security Checks
Let VibeEval scan your Fly.io application for vulnerabilities.
Scan Your App