Skip to main content

Security and privacy

Security in FLNet is closely tied to reproducibility and governance. The platform is intended for settings where analysis must remain both usable and controlled.

Core principles

Explicit authentication and authorization

Use realm-, client-, and role-based access control so users and services only receive the permissions they actually need.

Controlled execution

Tools should run in isolated, centrally governed environments instead of uncontrolled user machines.

Least privilege

Access tokens, runtime permissions, and service credentials should all be scoped as narrowly as possible.

Privacy-aware observability

Logs and monitoring should make execution understandable without exposing raw sensitive data.

Practical checklist

  • Use HTTPS everywhere.
  • Review realm and client configuration regularly.
  • Avoid logging raw PII or secret values.
  • Encrypt sensitive storage where applicable.
  • Apply timeouts, request-size limits, and rate limits at network boundaries.
  • Separate build-time trust from runtime trust wherever possible.

Why this matters in FLNet

The paper’s architecture depends on a simple idea: users can benefit from flexible workflows and AI-supported guidance only if the platform keeps execution bounded, observable, and governable.

That means security is not a side topic here. It is part of how the scientific workflow stays trustworthy.