Skip to main content

Security & Compliance

Multi-Layered Security Model

CCP implements defense-in-depth with a multi-layered security posture. Every request passes through authentication, authorization, encryption, and audit controls — no action is trusted by default. Security is not an add-on; it is built into every layer of the platform from the IAM engine to the storage tier.

Security LayerMechanismProtection
AuthenticationKeycloak v24.0.5 — OAuth2/OIDC, JWT tokens, MFAIdentity verification for every user and service interaction
AuthorizationOpenFGA — 18 pre-defined RBAC roles at Tenant and Cell levelsRole and context validation on every resource action
Transport EncryptionmTLS (Mutual TLS) between all servicesEncrypted communication and mutual service authentication
At-Rest EncryptionAES-256 for all stored dataData protected against unauthorized physical or logical access
Identity FederationSAML 2.0 with Microsoft ADFS and EntraSeamless SSO with enterprise identity providers; no password replication
Tenant IsolationPer-tenant Keycloak realmComplete identity and session isolation between tenants
Network SecurityVPC isolation, Firewall (CheckPoint / Palo Alto), NAT GatewayNetwork-level tenant segregation and perimeter protection
Audit LoggingAPI gateway logs, SIEM integration, centralized log managementFull traceability of every action; immutable audit trail
Security ServicesWAF, SIEM, CSPM, DDoS protection, Cloud HSM, SSL managementPerimeter and workload-level threat detection and protection

Identity and Access Management

Keycloak IAM Engine

CCP uses Keycloak v24.0.5 as its IAM engine. Every tenant gets a dedicated Keycloak realm — a completely isolated identity domain with its own users, roles, authentication flows, and federation configuration.

  • OAuth2 / OpenID Connect: Industry-standard token-based authentication
  • Multi-Factor Authentication: TOTP, SMS, email, and hardware key support
  • Session Management: Admin-forced session termination for security incidents
  • Per-Tenant Realm Isolation: Users in Tenant A cannot authenticate into Tenant B's realm under any circumstance

OpenFGA Authorization Engine

Authorization is enforced through OpenFGA, Coredge's fine-grained authorization engine. OpenFGA implements a relationship-based access control (ReBAC) model that evaluates permissions based on roles, relationships, and context — not just flat role assignments.

18 Pre-Defined RBAC Roles are organized across two levels:

  • 7 Organization-Level Roles — Control tenant and cell administration, user management, and platform governance
  • 11 Service-Specific Roles — Granular permissions aligned to individual service categories (compute, storage, network, security, monitoring, etc.)

This structure ensures the principle of least privilege: a user with Compute access cannot inadvertently access Security or Database management functions.

Identity Federation

Federation MethodIntegrationUse Case
SAML 2.0Microsoft ADFS, Microsoft EntraEnterprise SSO with existing corporate identity providers
BSS Portal FederationATB BSS PortalCustomer onboarding, subscription, and identity creation from the billing system
LDAP / Active DirectoryMicrosoft EntraDirectory-based user management and group synchronization

Encryption

In-Transit: Mutual TLS (mTLS)

All communication between CCP microservices, between the portal and APIs, and between CCP and integrated infrastructure uses mTLS. This means:

  • Both the client and server present valid certificates to each other before any data is exchanged
  • No service can impersonate another — every communication channel is mutually authenticated
  • All data moving between services is encrypted; there are no plaintext internal channels

At-Rest: AES-256

All data stored by CCP — platform state in PostgreSQL, event data in MongoDB, session data in Redis — is encrypted at rest using AES-256. This includes backup data stored in geo-replicated object storage.

Security Services Portfolio

CCP includes a comprehensive set of security services available through the self-service catalogue:

ServicePhaseDescription
SIEMMVP1Security Incident and Event Management — centralized threat detection and response
Log MonitoringMVP1Continuous log analysis and anomaly detection across platform and workloads
CSPMMVP1Cloud Workload Protection — posture management and configuration compliance
WAFMVP1Web Application Firewall — Layer 7 protection for web-facing workloads
Cloud HSMMVP2Cloud-based Hardware Security Module for key management and cryptographic operations
DDoS ProtectionMVP2Volumetric and application-layer DDoS mitigation
TLS/SSL Certificate ManagementMVP2Automated certificate lifecycle — issuance, renewal, revocation
Encryption as a ServiceMVP2Managed encryption for tenant workloads and data
Digital ForensicsMVP2Forensic analysis capabilities for incident investigation

Compliance Alignment

CCP is designed with compliance requirements of government and regulated industries in mind.

Compliance AreaCCP Implementation
Access ControlKeycloak IAM with RBAC (OpenFGA), per-tenant realm isolation, least privilege via 18 pre-defined roles
CryptographymTLS in transit, AES-256 at rest, Cloud HSM for key management
Audit & AccountabilityAPI gateway audit logs, SIEM integration, centralized log management with long-term retention
Identity & AuthenticationMFA, SAML 2.0 federation, SSO, session management, short-lived tokens
Data SovereigntyOn-premises deployment, local data residency, geo-replicated backups within defined regions
Workload ProtectionCSPM, WAF, firewall per tenant, per-cell network isolation via VPC

Privileged Access Management

CCP includes Privileged Access Management (PAM) as a foundation service, ensuring that privileged operations — administrative actions on infrastructure, emergency access, break-glass procedures — are controlled, logged, and subject to approval workflows. PAM is delivered as part of the MVP1 Foundation Services catalogue.