Commit f01e711
authored
Add Firebase security guidelines for personal projects
I've gathered some essential Firebase security guidelines for your personal projects. The key to Firebase security lies in properly configuring **Firebase Security Rules** and **Firebase Authentication** to control access to your data and backend services.
Here is a summary of the core security practices you should implement:
| Security Aspect | Key Guideline for Personal Projects |
| :--- | :--- |
| **🔒 General Rules** | Start in "Locked" or "Production" mode; never use public rules in production. |
| **👤 Authentication** | Use managed authentication (e.g., Google OAuth); require sign-in for data access. |
| **🗄️ Data Security** | Structure data for user-based access; enforce ownership with `request.auth.uid`. |
| **🚫 Abuse Prevention** | Enable App Check; set up budget alerts and use emulators for development. |
| **⚙️ Admin SDK** | Use only on trusted servers; it bypasses all security rules. |
### 📝 Implement Core Security Rules
The most critical step is writing secure rules for your database and storage. **Never deploy your app with open rules** that allow all reads and writes (`allow read, write: if true;`), as this lets anyone steal or destroy your data.
- **For User-Specific Data**: The most common pattern for personal projects is to restrict access so users can only manage their own data.
```javascript
// Cloud Firestore: User owns their document
service cloud.firestore {
match /databases/{database}/documents {
match /users/{userId} {
allow read, write: if request.auth != null && request.auth.uid == userId;
}
}
}
```
```json
// Realtime Database: User owns their data path
{
"rules": {
"users": {
"$uid": {
".read": "auth != null && auth.uid === $uid",
".write": "auth != null && auth.uid === $uid"
}
}
}
}
```
- **For Mixed Public & Private Data**: You can create rules that allow public reading but restrict writing to owners.
```javascript
// Cloud Storage: Public read, owner-only write
service firebase.storage {
match /b/{bucket}/o {
match /user_uploads/{userId}/{allPaths=**} {
allow read;
allow write: if request.auth != null && request.auth.uid == userId;
}
}
}
```
### 🔐 Strengthen Authentication and Prevent Abuse
- **Use Strong Authentication**: For managed authentication, OAuth 2.0 providers (like Google Sign-In) are more secure than email/password alone.
- **Enable App Check**: To help protect your backend resources from abuse, enable **Firebase App Check**. This helps ensure only your apps can access your project's services.
- **Set Up Alerts**: In the Google Cloud Console, set up budget alerts to be notified of unexpected spikes in usage that could indicate an attack or a bug in your app.
### 🛠️ Adopt Secure Development Practices
- **Use the Emulator Suite**: Test your security rules and app logic locally using the **Firebase Local Emulator Suite** before deploying. This prevents you from accidentally causing a denial-of-service attack on your own live service during development.
- **Manage Environments**: Create separate Firebase projects for **development** and **production**. This keeps your test data isolated and prevents development mistakes from affecting your live application.
- **Store Config Securely**: While Firebase API keys are not secret, it's still a good practice to load your app's configuration using environment variables, especially when working with different environments.
I hope these guidelines provide a solid foundation for securing your personal Firebase project. If you'd like more detailed examples for a specific use case, such as setting up role-based access, feel free to ask.1 parent eb420a6 commit f01e711
1 file changed
Lines changed: 56 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
0 commit comments