# Security Best Practices for Recipes

# Handling Sensitive Data

When authoring recipes, Workato strongly recommends that you avoid placing sensitive data as plain text within the steps of a recipe. This especially applies tokens or keys used for authentication to remote services, but also to personal information (such as names, addresses, emails) and anything else that should be kept private to the recipe author.

To avoid sensitive data in recipe steps:

  1. Do not place authentication information used for a Connector (the HTTP Connector for example) in the recipe, as a hard-coded string. For example, don't specify a URL such as https://www.myapp.com/services/api-method?token=3ababe3235Z2z in the recipe. The best practice is to store the authentication token in the properties for the Connection. See for example setting up authentication with a query parameter.

  2. For other sensitive data, consider placing it in the Environment Properties and make reference to it as needed in recipes.

  3. Another approach is to use a data pill to pass the sensitive data from a previous step to the current step. (This assumes that prior step has also not used hard-coded sensitive data).

Following these guidelines will have the following security benefits:

  • Sensitive data will not be exposed to other users within your Workato workspace environment.

  • Sensitive data will not be exposed when a recipe is cloned. When a recipe is cloned, and copied into another Workato account, data that is part of the recipe steps will be copied, but Connection properties and Environment Properties are not copied, nor are the dynamic contents of data pills.

  • It will be easier to maintain and manage sensitive information, because that information will be centralized, rather than spread across disparate recipes.

  • If you decide to share your recipe with the community at some point by making it public, no sensitive data will be exposed.

# Storing Sensitive Data

Caution should be taken when storing sensitive data in Workato FileStorage or Data tables, including personal data that would fall under privacy laws and regulations, financial data, and/or healthcare data. While Workato protects such data at rest and in transit through encryption, customers are responsible for assessing whether storage of such data is appropriate and allowable given their own policies and legal/regulatory requirements, as well as applying appropriate access controls. Note in particular that Workato is not at present PCI certified.


Last updated: 9/11/2024, 4:23:13 AM