Security First
Your workflows and data are protected by multiple layers of security. Here's how we keep your n8n instances safe.
Infrastructure Isolation
Every n8n instance runs in its own isolated Docker container with dedicated resources. This ensures:
- Complete process isolation between customers
- Dedicated CPU and memory allocations
- Separate database per instance
- No shared file systems or network namespaces
Network Security
All traffic is encrypted and our infrastructure is protected against common attacks:
- TLS 1.3 encryption for all connections
- Firewall rules limiting access to necessary ports only
- DDoS protection at the infrastructure level
- Private networking between internal services
Data Encryption
Your data is encrypted both in transit and at rest:
- AES-256 encryption for data at rest
- n8n credentials encrypted with instance-specific keys
- Encrypted database connections
- Secure backup storage with encryption
Access Controls
Strict access controls protect your instances and data:
- Role-based access control (RBAC)
- Audit logging for all administrative actions
- Secure password hashing (bcrypt)
- Session management with secure tokens
Backup Security
Your backups are stored securely with multiple safeguards:
- Encrypted backup storage
- Geographic redundancy for disaster recovery
- Automatic deletion after 30 days
- Access restricted to account owners only
Compliance
We're committed to meeting regulatory requirements:
- GDPR-ready with EU data center options
- Data processing agreements (DPA) available upon request
- Data residency control (choose your region)
- Right to data export and deletion
Report a Security Issue
Found a security vulnerability? We appreciate responsible disclosure. Please report security issues to:
security@n8nserverhosting.comWe aim to acknowledge security reports within 24 hours and provide a detailed response within 72 hours.