Skip to content

Security Model

Richard Kindler edited this page Nov 25, 2025 · 1 revision

📘 Security Model

Security is designed around three core principles: isolation, verification, and auditability.

Key Controls

KMS-Protected Signing

Private keys live in AWS HSM-backed key vaults. Gateway receives signatures only.

Zero Secrets in Code

All secrets loaded via ExternalSecrets.

Rate Limiting

Per-IP, per-token, and global limits supported.

Audit Logging

Every signing operation is logged with digest, timestamp, and KMS key ID.

Network Isolation

Workers can run in a private subnet with NAT-only outbound RPC access.

Clone this wiki locally