This document outlines the security features and compliance posture of the software system.
It is intended to provide customers and stakeholders with a clear understanding of the security
mechanisms in place and the standards to which the system adheres.
All inter-service communication within the Kubernetes cluster is encrypted using mutual TLS (mTLS) via Istio service mesh.
All ingress and egress communication uses TLS 1.2 or higher.
At Rest
Data stored in blob storage is encrypted at rest using cloud-native encryption mechanisms (e.g., Azure Storage Service Encryption, AWS S3 Server-Side Encryption).
Encryption keys are managed by the underlying cloud provider and rotated according to provider best practices.
End-user authentication is managed through Keycloak, which supports integration with external identity providers such as Azure Active Directory and Google Identity.
Authentication follows the OAuth2 and OpenID Connect standards.
Role-based access control (RBAC) is applied across the system.