Security
Security at HolonomiX
Architecture-level controls. No marketing language.
Encryption
Data Encryption
All data encrypted at rest using AES-256-GCM with random nonces.
TLS 1.2+ enforced for all data in transit.
Encryption keys injected via environment at container start — never stored on disk, never committed to source control.
Authentication
Authentication
Every API request authenticated via bearer token or X-API-Key header.
Keys are 56-character cryptographically random tokens.
Stored as SHA-256 hashes — raw keys are shown once at provisioning and cannot be recovered.
Key rotation available on demand with immediate invalidation of previous credentials.
Isolation
Tenant Isolation
Namespace-level access control. Each tenant is restricted to their own namespaces.
Cross-tenant data access is architecturally impossible — enforced at the proxy layer before requests reach compute.
Rate limiting and compute quota enforcement applied per-tenant.
Audit
Audit Logging
Every operation produces an append-only audit record: timestamp, tenant, method, path, namespace, outcome, response code, latency, and client metadata.
Logs are fsync-durable per entry.
No API keys, authorization headers, or secret material appear in logs.
Infrastructure
Infrastructure
Deployed on isolated compute instances. Internal services communicate over private networks only.
The API gateway is the sole public entry point.
No direct access to backend compute or storage from the internet.
Health monitoring with automated recovery.
Webhooks
Webhook Verification
All inbound webhooks verified via HMAC-SHA256 signature before processing.
Idempotency enforcement prevents replay attacks.
Events processed exactly once.
Secrets
Secret Management
All secrets loaded from environment variables.
No credentials in configuration files, source control, or container images.
Error responses never expose internal paths, stack traces, or key material.
Availability
Availability
Connection pooling, request timeouts, and circuit-breaking on backend failures.
Shared state backed by Redis with graceful degradation if unavailable.
Stateless gateway design supports horizontal scaling.
Incident Response
Incident Response
Security issues: [email protected]
48-hour acknowledgment SLA.
Critical vulnerabilities patched within 24–72 hours.
Coordinated disclosure supported.
Compliance
Compliance
Architecture designed to support HIPAA, SOC 2, and FedRAMP control requirements. Formal audit engagement available on request for enterprise customers.