← Back to Guides

    How to Secure Retool

    Step-by-step guide to securing your Retool internal tools and admin panels.

    Retool Security Context

    Retool connects directly to your databases and APIs to build internal tools. Proper RBAC configuration, database permissions, and credential management are essential to prevent unauthorized data access.

    Security Checklist

    1

    Configure database permissions

    Critical

    Use read-only connections where write access is not needed.

    2

    Implement RBAC

    Critical

    Set up role-based access control for internal tools.

    3

    Secure API credentials

    Critical

    Store API keys and credentials securely in Retool resources.

    4

    Review query permissions

    Critical

    Control which users can run which database queries.

    5

    Enable SSO

    Configure Single Sign-On for enterprise security.

    6

    Configure audit logging

    Enable audit logs for compliance and monitoring.

    7

    Review resource access

    Audit which apps can access which data sources.

    8

    Configure IP allowlisting

    Restrict access to trusted IP addresses.

    9

    Enable 2FA

    Require two-factor authentication for all users.

    10

    Review custom JavaScript

    Audit any custom JavaScript transformers.

    11

    Configure environment variables

    Use environment variables for sensitive data.

    12

    Review webhook security

    Secure any exposed webhooks.

    13

    Configure data retention

    Set appropriate data retention policies.

    14

    Review embedded apps

    Secure any embedded Retool apps.

    15

    Test user permissions

    Verify RBAC works correctly for all roles.

    16

    Run security scan

    Use VibeEval to scan your application.

    Related Resources

    Automate Your Security Checks

    Let VibeEval scan your application for vulnerabilities.

    Scan Your App