Skip to main content
Ably takes security seriously and has implemented comprehensive measures to protect the platform and user data.

Security measures

Ably’s security approach includes multiple layers of protection across the platform:

Transport layer security

All connections to Ably use TLS encryption by default:
  • Port 443: HTTPS traffic over TLS (primary for all WebSocket and HTTP connections)
  • Port 5671: Ably queues over AMQP (TLS only)
  • Port 61614: Ably queues over STOMP (TLS only)
  • Port 8883: MQTT adapter over TLS
Using unencrypted connections (ports 80 and 1883) is not recommended and is disabled by default in all client libraries for security reasons.

Message encryption

Ably provides encryption options for message payloads. Messages can be encrypted before transmission, ensuring end-to-end security even if transport encryption were to be compromised. For detailed information about encryption options, see the encryption documentation.

DDoS protection

Ably employs multiple layers of protection against denial of service attacks:

Layer 3/4 protection

AWS Shield Advanced protects against volumetric DDoS attacks at the network and transport layers.

Layer 7 protection

CloudFront WAF protects against application-layer attacks with custom rules and rate limiting.

Automatic detection

Continuous monitoring detects anomalies that indicate an attack is underway.

Scalable infrastructure

Infrastructure scales rapidly to absorb traffic spikes, whether from legitimate usage or attacks.

AWS Shield Advanced

Ably utilizes AWS Shield Advanced to protect against volumetric DDoS attacks. Key features include:
  • Automatic attack detection: Continuous monitoring of traffic patterns to detect anomalies
  • Automatic mitigation: Filters malicious traffic while allowing legitimate traffic to pass through
  • Global network absorption: Leverages AWS’s global network infrastructure to absorb and diffuse attack traffic
  • Expert assistance: Access to the AWS Shield Response Team (SRT) during attacks

CloudFront WAF

The CloudFront Web Application Firewall (WAF) protects against application-layer attacks:
  • Custom rules: Identify and block malicious requests based on their characteristics
  • Rate limiting: Limit the rate of requests from specific IP addresses
  • Geographic blocking: Temporarily block traffic from specific regions if attacks originate there
  • Bot management: Distinguish between legitimate bots and malicious bots

Resource protection

Ably implements rate limiting at multiple levels to prevent resource exhaustion:
  • Per account
  • Per application
  • Per key
  • Per token
  • Per IP address
This prevents any single entity from generating excessive traffic or consuming excessive resources.

Reporting security vulnerabilities

If you believe you have found a security or privacy vulnerability that could impact Ably or its users, report it immediately by following the Vulnerability Disclosure Policy.

How to report

1

Submit detailed reports

Submit reports through the official disclosure process at ably.com/disclosure.
2

One vulnerability per report

Each report should explain one vulnerability with clear impact assessment.
3

Include reproduction steps

Provide step-by-step reproduction instructions or proof of concept.
4

Use responsible disclosure

Follow responsible disclosure practices. Do not publicly disclose the vulnerability before Ably has addressed it.

Bug bounty program

Ably operates a bug bounty program that rewards security researchers for legitimate vulnerability reports.
  • Financial rewards: Successful vulnerability reports are rewarded based on severity and impact
  • Public recognition: Security researchers are recognized on the acknowledgements page
  • Coordinated disclosure: Work with Ably’s security team to ensure vulnerabilities are addressed before public disclosure
Activities conducted in accordance with the vulnerability disclosure policy are considered authorized conduct. Ably will not initiate legal action against researchers operating in good faith within policy guidelines.
For questions regarding coordinated disclosure, contact [email protected].

Authentication and authorization

Ably provides multiple authentication mechanisms to secure access to your applications:

API keys

API keys provide basic authentication for server-side applications. Keys can be scoped with specific capabilities to limit what operations they can perform.

Token authentication

Token authentication is recommended for client-side applications:
  • Tokens are time-limited and can be revoked
  • Tokens can be issued with specific capabilities and channel permissions
  • Tokens can include client identity information
For detailed information, see the authentication documentation.

Network security

For applications operating behind firewalls or with network security devices, Ably provides clear guidance on required configurations:

Required domains

Core Ably endpoints:
  • rest.ably.io - REST API requests
  • realtime.ably.io - Realtime WebSocket connections
  • a.ably-realtime.com through e.ably-realtime.com - Fallback hosts
Additional endpoints:
  • internet-up.ably-realtime.com - General connectivity checks
  • ws-up.ably-realtime.com - WebSocket connectivity checks
Ably cannot provide static IP addresses for the cloud-based service as the infrastructure is elastic and IP addresses are reassigned dynamically. You must use domain-based allowlisting rather than IP-based rules.

Enterprise customers

Enterprise customers with custom configurations may have different endpoint domains. Contact Ably support to confirm the specific domains for your account configuration.

Compliance and certifications

Ably maintains compliance with industry standards and regulations. For information about specific certifications and compliance frameworks, contact Ably support.

Next steps

Authentication

Learn about authentication methods and best practices

Edge network security

Explore edge network security and DDoS protection in detail

Encryption

Understand message encryption options

Vulnerability disclosure

Read the full vulnerability disclosure policy

Build docs developers (and LLMs) love