Prepared answers for the Amazon SP-API Security Assessment call — Based on actual LogShip ERP architecture
https://app.logship.de by authorized users with role-based permissions. Each customer operates within their own organization context with isolated data/orders/v0/orders) — Import Amazon orders including customer shipping/billing details for fulfillment/feeds/2021-06-30/) — Upload VAT invoices (UPLOAD_VAT_INVOICE feed type) for EU marketplace compliance/sellers/v1/marketplaceParticipations) — Connection testing to verify credentialsapi.amazon.com/auth/o2/token) — OAuth refresh token flow for short-lived access tokenssellingpartnerapi-eu.amazon.com
npm audit to track known vulnerabilities in Node.js dependenciesunattended-upgrades for automatic security patchinglocalhost only. Laravel runs on a separate server in the same private subnet — all completely inaccessible from the internetunattended-upgrades — automatic security updates applied dailysellingpartnerapi-eu.amazon.com and api.amazon.comc_ordersource table.env files (which contain infrastructure config) are excluded from version control via .gitignore.
unattended-upgrades — automatic daily security updates. Critical patches applied immediatelynpm audit used to identify and resolve known vulnerabilities in JavaScript packagesnpm auditdev-app.logship.de) and production (app.logship.de) environments are separatedev branch for development, main branch for productionlogship_organization_id cookie and server-side checks enforce thisauth.log records all SSH login attempts and failures| Service | Purpose | Receives Amazon PII? | Encryption |
|---|---|---|---|
| Amazon SP-API | Order import, invoice upload | Yes (invoices with customer data) | HTTPS/TLS |
| DHL API | Shipping labels | Yes (name, address, email, phone) | HTTPS/TLS + OAuth |
| Sendcloud API | Multi-carrier shipping | Yes (name, address) | HTTPS/TLS + Basic Auth |
| Shopify API | E-commerce channel | No | HTTPS/TLS |
| iDempiere | ERP backend (same server) | N/A (internal, stores PII encrypted) | localhost |
| Laravel | Internal API (private subnet) | N/A (internal, delivery confirmations) | Private subnet |
| PostgreSQL | Database (same server) | N/A (internal, PII encrypted at rest) | localhost |
| Elasticsearch | Search (same server) | No | localhost |
| Strapi | CMS (same server) | No | localhost |
ss -tlnp to show all services bound to localhost.
ss -tlnp output.ss -tlnp or netstat -tlnp to show that PostgreSQL, Elasticsearch, iDempiere, etc. are bound to 127.0.0.1 (localhost) only. Only Nginx is bound to 0.0.0.0:443.
LogYou GmbH — Amazon SP-API Security Assessment Preparation
Answers based on actual LogShip ERP codebase and architecture review — March 2026