This document outlines the security features and compliance posture of the software system. It is intended to provide customers and stakeholders with a clear understanding of the security mechanisms in place and the standards to which the system adheres.
In Transit
At Rest
Secrets are securely managed using the CSI (Container Storage Interface) driver with support for:
Secrets are mounted into pods at runtime and are never stored in plaintext in the cluster.
Access to secrets is controlled through fine-grained identity and access management (IAM) policies, tied to the workload identity.
Rotation of secrets is handled externally and reflected immediately via CSI mounts.
End-user authentication is managed through Keycloak, which supports integration with external identity providers such as Azure Active Directory and Google Identity.
Authentication follows the OAuth2 and OpenID Connect standards.
Role-based access control (RBAC) is applied across the system.
Roles and Permissions:
Continuous integration and delivery (CI/CD) pipelines include:
All container images are built from hardened, minimal base images and scanned prior to release.
stdout
/stderr
) following container logging best practices.The system is designed and operated in accordance with industry-recognized security and data protection standards:
This document outlines the security features and compliance posture of the software system. It is intended to provide customers and stakeholders with a clear understanding of the security mechanisms in place and the standards to which the system adheres.
In Transit
At Rest
Secrets are securely managed using the CSI (Container Storage Interface) driver with support for:
Secrets are mounted into pods at runtime and are never stored in plaintext in the cluster.
Access to secrets is controlled through fine-grained identity and access management (IAM) policies, tied to the workload identity.
Rotation of secrets is handled externally and reflected immediately via CSI mounts.
End-user authentication is managed through Keycloak, which supports integration with external identity providers such as Azure Active Directory and Google Identity.
Authentication follows the OAuth2 and OpenID Connect standards.
Role-based access control (RBAC) is applied across the system.
Roles and Permissions:
Continuous integration and delivery (CI/CD) pipelines include:
All container images are built from hardened, minimal base images and scanned prior to release.
stdout
/stderr
) following container logging best practices.The system is designed and operated in accordance with industry-recognized security and data protection standards: