Skip to main content

Security & Compliance

Zero-Trust Security Model

Dflare AI implements defense-in-depth with zero-trust principles — no action is trusted by default, every request is authenticated and authorized at multiple levels:

Zero-Trust Defence-in-Depth Security Architecture

Security LayerMechanismProtection
AuthenticationOAuth2/JWT via enterprise IAM, RS256, short TTL, MFAIdentity verification for every interaction
AuthorizationRBAC + ABAC via auth serviceRole and context validation on every action
TransportTLS 1.2+, mTLS between services, HSTSEncrypted communication, mutual authentication
Network IsolationVRF/VLAN (Ethernet), Partition Key (IB)Hardware-enforced tenant traffic separation
Storage IsolationAccess Control Map + Partition KeyTwo independent layers protecting tenant data
Compute IsolationK8s namespaces, Slurm cgroups v2Workload-level resource confinement
AuditCorrelation ID, immutable logs, object storage backupFull traceability of every action
FirewallPerimeter firewall with ACLsStrict access control at network perimeter

Tenant Isolation Model (6 Layers)

Tenant Isolation Model

Compliance Alignment

StandardControl AreaImplementation
NIST 800-53 Rev 5AC — Access ControlRBAC via IAM, SSO, scoped tokens, tenant realm isolation
NIST 800-53 Rev 5AU — AuditImmutable logs, session tracking, telemetry pipeline
ISO/IEC 27001A.9 Access ControlIAM with RBAC, SSO, scoped roles per domain/project/org
ISO/IEC 27001A.10 CryptographyTLS/mTLS, PKI, certificate lifecycle management
HIPAAAccess ControlIAM, RBAC, ACLs, SSO, scoped tokens per tenant
HIPAAAudit ControlsImmutable logs, session playback, telemetry pipeline

Data Protection

  • All metering and billing data stored in platform-controlled databases with no tenant write access
  • Metering data backed up to object storage on a configurable schedule
  • HA time-series storage with replication for metrics data
  • Object storage lifecycle rules: configurable tiering and retention policies
  • Sensitive data anonymized where feasible; compliant with GDPR data minimization principles