Epic: Security & SOC 2 Compliance #11

Open
opened 2026-03-29 23:21:27 +02:00 by claude · 0 comments
Owner

Overview

SOC 2 Type II compliance from day 1. Not bolted on after launch — baked into every architectural decision. Enterprise Camel users (banks, insurance, logistics) won't touch a platform without it.

SOC 2 Trust Service Criteria (Day 1)

Security (CC6)

  • Encryption at rest: PostgreSQL (TDE or volume encryption), OpenSearch, K8s Secrets (sealed-secrets or SOPS)
  • Encryption in transit: TLS everywhere — ingress, inter-service, agent-to-server, database connections
  • Network segmentation: K8s NetworkPolicies (see #8), no cross-tenant paths
  • Vulnerability management: container image scanning (Trivy), dependency scanning, OS patching cadence
  • Penetration testing: pre-launch and annual

Availability (A1)

  • Defined SLAs per tier (best effort → 99.95%)
  • Redundancy: multi-replica control plane, database replication
  • Backup and disaster recovery: automated PostgreSQL backups, OpenSearch snapshots
  • Incident response plan documented

Processing Integrity (PI1)

  • Input validation on all API boundaries
  • Idempotent provisioning (Flux handles this)
  • Data integrity checks (checksums on uploaded JARs, agent payloads)

Confidentiality (C1)

  • Tenant data isolation (namespace + schema/index separation)
  • Secrets encryption with per-tenant keys (envelope encryption)
  • Data retention policies enforced per tier
  • Data deletion on tenant offboarding (GDPR right to erasure)

Privacy (P1-P8)

  • Privacy policy and DPA (Data Processing Agreement)
  • PII minimization — platform stores minimal user data
  • Data residency awareness (future: region selection)

Audit Logging

  • Every state-changing action logged: who, what, when, from where
  • Covers: auth events, provisioning, config changes, secret access, billing events, API calls
  • Immutable audit log (append-only, separate from operational DB)
  • Retention: minimum 1 year (SOC 2 requirement)
  • Queryable for compliance audits and incident investigation

Access Control

  • Principle of least privilege for all platform components
  • Service accounts with minimal K8s RBAC
  • Admin access logged and time-bounded
  • No shared credentials — individual accounts for all operators

Supply Chain Security

  • Signed container images (cosign/sigstore)
  • SBOM generation for all artifacts
  • Dependency pinning (no floating versions)
  • CI pipeline hardened: no secrets in logs, minimal build permissions

Compliance Automation

  • Evidence collection automated where possible
  • Vanta, Drata, or similar for continuous compliance monitoring (evaluate)
  • Regular access reviews
  • Change management tracked via Gitea issues + git history
## Overview SOC 2 Type II compliance from day 1. Not bolted on after launch — baked into every architectural decision. Enterprise Camel users (banks, insurance, logistics) won't touch a platform without it. ## SOC 2 Trust Service Criteria (Day 1) ### Security (CC6) - Encryption at rest: PostgreSQL (TDE or volume encryption), OpenSearch, K8s Secrets (sealed-secrets or SOPS) - Encryption in transit: TLS everywhere — ingress, inter-service, agent-to-server, database connections - Network segmentation: K8s NetworkPolicies (see #8), no cross-tenant paths - Vulnerability management: container image scanning (Trivy), dependency scanning, OS patching cadence - Penetration testing: pre-launch and annual ### Availability (A1) - Defined SLAs per tier (best effort → 99.95%) - Redundancy: multi-replica control plane, database replication - Backup and disaster recovery: automated PostgreSQL backups, OpenSearch snapshots - Incident response plan documented ### Processing Integrity (PI1) - Input validation on all API boundaries - Idempotent provisioning (Flux handles this) - Data integrity checks (checksums on uploaded JARs, agent payloads) ### Confidentiality (C1) - Tenant data isolation (namespace + schema/index separation) - Secrets encryption with per-tenant keys (envelope encryption) - Data retention policies enforced per tier - Data deletion on tenant offboarding (GDPR right to erasure) ### Privacy (P1-P8) - Privacy policy and DPA (Data Processing Agreement) - PII minimization — platform stores minimal user data - Data residency awareness (future: region selection) ## Audit Logging - **Every** state-changing action logged: who, what, when, from where - Covers: auth events, provisioning, config changes, secret access, billing events, API calls - Immutable audit log (append-only, separate from operational DB) - Retention: minimum 1 year (SOC 2 requirement) - Queryable for compliance audits and incident investigation ## Access Control - Principle of least privilege for all platform components - Service accounts with minimal K8s RBAC - Admin access logged and time-bounded - No shared credentials — individual accounts for all operators ## Supply Chain Security - Signed container images (cosign/sigstore) - SBOM generation for all artifacts - Dependency pinning (no floating versions) - CI pipeline hardened: no secrets in logs, minimal build permissions ## Compliance Automation - Evidence collection automated where possible - Vanta, Drata, or similar for continuous compliance monitoring (evaluate) - Regular access reviews - Change management tracked via Gitea issues + git history
claude added the epicsecurity labels 2026-03-29 23:21:48 +02:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: cameleer/cameleer-saas#11