Security Model

Defense
in Depth

Four independent security layers protect every document from creation through delivery. No single point of failure. Every action logged.

Network Layer

Zero Exposed Ports

Zero Exposed Ports

All services run on internal ports only. No direct internet exposure. External access exclusively through Cloudflare Zero Trust tunnels. Attack surface: zero.

Cloudflare Zero Trust

Every request passes through Cloudflare's edge with identity verification, device posture checks, and geo-restrictions before reaching the tunnel.

Rate Limiting

Configurable per-endpoint rate limits with sliding window counters. Automatic blocking with exponential backoff for repeat offenders.

Webhook Validation

HMAC-SHA256 signature verification on all inbound webhooks with timestamp validation and replay attack prevention (5-minute window).

Application Layer

Session Isolation & Control

ControlMechanism
AuthenticationOTP-based verification for all signing and viewing sessions (6-digit, 5-minute window)
AuthorizationThree-tier governance model (Tier 0 auto, Tier 1 OTP, Tier 2 manual)
Session IsolationUnique session IDs with time-limited access tokens per recipient
Viewer ProtectionCopy, print, download, screenshot prevention in SDC viewer
Export PolicyFour-tier export control: none / watermarked / redacted / full
Forensic WatermarkInvisible per-session watermarks enable leak traceability to session/identity
Cryptographic Layer

Military-Grade Primitives

PrimitiveAlgorithmApplication
EncryptionAES-256-GCMAt-rest document and backup encryption
HashingSHA-256Document fingerprinting and hash-chain integrity
Key DerivationPBKDF2 (100k iterations)Encryption key generation from passwords
SignaturesHMAC-SHA256Webhook validation and document signing
CanonicalizationDeterministicReproducible hashing across all formats
Operational Layer

Immutable Audit Infrastructure

Encrypted Backups

AES-256-GCM encrypted archives with 7-day rotation, chain verification, and point-in-time recovery capability.

Immutable Ledgers

Seven independent hash-chain ledgers tracking governance, access, signing, conversation, perimeter, backup, and lifecycle events.

Health Monitoring

Real-time system health dashboard on port 3005. Service readiness checks, IPFS connectivity, and backup status monitoring.

Perimeter Logging

Every network event logged: access grants, denials, rate limits, validation failures, and replay attempts. Tamper-evident ledger.

Controls Summary

Active Security Controls

ControlLayerStatus
Zero Trust tunnelsNetworkACTIVE
Rate limitingNetworkACTIVE
HMAC webhook validationNetworkACTIVE
Replay preventionNetworkACTIVE
OTP verificationApplicationACTIVE
Tiered governanceApplicationACTIVE
Viewer protectionApplicationACTIVE
AES-256-GCM encryptionCryptographicACTIVE
SHA-256 fingerprintingCryptographicACTIVE
Hash-chain ledgersCryptographicACTIVE
Encrypted backupsOperationalACTIVE
Health monitoringOperationalACTIVE
Compliance

Regulatory Alignment

ESIGN Act (2000) UETA SEC Rule 17a-4 SOC 2 Alignment TCPA AES-256-GCM PBKDF2 Ed25519 (RFC 8032) RFC 8785 / JCS IPFS CIDv1
📄 Verify a Certificate → System Public Key → Compliance Disclosures →