At a high level, Boomerang implements the following security measures for the Developer API:
Credential protection
Token material and key configuration are stored and processed using hardened infrastructure and access control aligned with industry practice.
Access control and least privilege
Operational access to production systems and configuration is restricted to authorised staff using principles.
Segregation of environments
Non-production environments are separated from production. Production data is not routinely used in development or testing environments.
Monitoring and anomaly detection
The platform monitors aggregate usage and key activity to detect patterns consistent with abuse, automated attacks, or misconfiguration.
Boomerang logs access to the Developer API to support security and operational stability. This includes:
Requests at the gateway level (for example, method, path, status).
Token usage metadata (for example, which token was used, when, and for which high-level operation).
Limited diagnostic information required to operate and secure the service.
General principles:
Sensitive values, such as full token strings, are not intended to be logged in plaintext in operational logs.
Logs and analytics are used to:
Detect unusual patterns (for example, sudden spikes, unexpected geographies).
Investigate incidents and abuse.
Inform rate limits and safeguards where necessary.
Integrator expectations:
Avoid logging full tokens or other secrets in application or infrastructure logs.
Apply masking or truncation for any sensitive fields you choose to log.
Log request context in a way that supports your own investigation (for example, X-Request-Id, trace IDs, and relevant identifiers), without including raw secrets.
To reduce exposure, Boomerang supports IP allowlisting on a per-key basis:
Allowlists can be configured so that specific tokens only function when calls originate from approved IP addresses or ranges.
Keys without configured allowlists rely solely on token secrecy and other controls.
Expectations and recommendations:
Where possible, configure IP allowlists for production tokens, restricting them to controlled network locations (for example, VPN, specific VPC egress IPs).
Avoid making calls to the Developer API directly from:
Developer laptops over arbitrary networks.
Uncontrolled on-premises networks without additional safeguards.
IP allowlisting is intended as a defence-in-depth measure; it does not replace correct token handling or application-level security.