Security Best Practices
Recommended security practices for integrating with the Bila platform
Security Best Practices
This guide outlines recommended security practices to help you securely integrate with the Bila platform and protect your users’ sensitive financial information.
API Key Security
Your API keys are the primary credentials for accessing the Bila API. Protecting them is critical:
Never expose your secret API keys in client-side code, public repositories, or to unauthorized individuals.
API Key Management
Use Environment Variables
Store API keys in environment variables, not in your code:
Separate Test and Live Keys
Use test keys for development and live keys only in production environments.
Implement Key Rotation
Regularly rotate your API keys, especially after team member changes.
API Key Rotation in Bila Console
Use Restricted API Keys
Create keys with the minimum permissions needed for specific services or applications.
Secure Your Integration
TLS/SSL Requirements
Always use HTTPS for all API requests and webhook endpoints. Bila requires TLS 1.2 or higher.
Webhook Security
Secure your webhook endpoints to ensure you only process legitimate requests from Bila:
Verify Webhook Signatures
Always verify the signature included in webhook requests:
Use HTTPS for Webhooks
Only configure webhook endpoints that use HTTPS.
Implement Retry Logic
Handle webhook delivery failures gracefully with proper retry logic.
User Authentication & Authorization
When building applications that integrate with Bila, implement strong user authentication:
Multi-Factor Authentication
Multi-Factor Authentication Flow
- Require MFA for all administrative accounts
- Implement MFA for sensitive operations like large transfers
- Support multiple MFA methods (SMS, authenticator apps, security keys)
Session Management
- Set appropriate session timeouts (15-30 minutes for inactivity)
- Regenerate session IDs after authentication
- Implement secure cookie policies:
Data Protection
Sensitive Data Handling
- Never store full card numbers or CVV codes
- Use Bila’s tokenization for payment methods
- Implement data minimization principles
PCI DSS Compliance
If you handle card data directly:
- Use Bila.js to tokenize card information client-side
- Maintain PCI DSS compliance for your systems
- Consider using Bila Checkout to avoid handling card data entirely
Bila.js Tokenization Flow
Fraud Prevention
Implement these measures to reduce fraud risk:
Address Verification
Enable AVS checks for card payments to verify billing addresses
3D Secure
Use 3D Secure for strong customer authentication
Velocity Checks
Monitor and limit the frequency of transactions from the same source
IP Geolocation
Flag transactions from high-risk locations or with IP/location mismatches
Error Handling & Logging
Secure Error Handling
- Never expose sensitive information in error messages
- Use generic error messages for users
- Log detailed errors server-side for debugging
Secure Logging
- Redact sensitive information in logs (API keys, PII, financial data)
- Implement proper log rotation and retention policies
- Use structured logging for better analysis
Regular Security Audits
Maintain a strong security posture with regular reviews:
- Conduct periodic security assessments of your integration
- Keep all dependencies and libraries up to date
- Subscribe to Bila’s security notifications
- Review access logs regularly for suspicious activity
Incident Response
Prepare for security incidents:
- Develop an incident response plan
- Know how to rotate compromised API keys quickly
- Have Bila support contact information readily available
- Document procedures for communicating with affected users