Skip to content

Security and Compliance

AsyncMQ provides runtime primitives; secure operation is your responsibility.

Core Practices

  • run backends on private networks
  • enforce TLS where supported
  • use least-privilege credentials for workers/producers
  • avoid putting secrets or sensitive raw PII in job payloads
  • enforce idempotency and authorization in producer endpoints

Dashboard Security

  • enable authentication (AsyncMQAdmin(enable_login=True, backend=...))
  • use strong session/JWT secrets
  • restrict dashboard exposure by network controls and identity provider layers

Logging and Data Handling

  • do not log secrets from job args/kwargs
  • control retention of completed/failed jobs (purge / cleanup jobs)
  • ensure storage encryption requirements are met by your backend deployment

Compliance Notes

For GDPR/HIPAA/PCI-like requirements:

  • keep payloads minimal (prefer references over full records)
  • define clear retention and deletion workflows
  • audit who can enqueue, inspect, retry, and delete jobs

AsyncMQ can be part of compliant architectures, but compliance is system-level, not library-only.