Security

Security at HolonomiX

Architecture-level controls. No marketing language.

Encryption

Data Encryption

All data encrypted at rest using AES-256-GCM with random nonces.
TLS 1.2+ enforced for all data in transit.
Encryption keys injected via environment at container start — never stored on disk, never committed to source control.

Authentication

Authentication

Every API request authenticated via bearer token or X-API-Key header.
Keys are 56-character cryptographically random tokens.
Stored as SHA-256 hashes — raw keys are shown once at provisioning and cannot be recovered.
Key rotation available on demand with immediate invalidation of previous credentials.

Isolation

Tenant Isolation

Namespace-level access control. Each tenant is restricted to their own namespaces.
Cross-tenant data access is architecturally impossible — enforced at the proxy layer before requests reach compute.
Rate limiting and compute quota enforcement applied per-tenant.

Audit

Audit Logging

Every operation produces an append-only audit record: timestamp, tenant, method, path, namespace, outcome, response code, latency, and client metadata.
Logs are fsync-durable per entry.
No API keys, authorization headers, or secret material appear in logs.

Infrastructure

Infrastructure

Deployed on isolated compute instances. Internal services communicate over private networks only.
The API gateway is the sole public entry point.
No direct access to backend compute or storage from the internet.
Health monitoring with automated recovery.

Webhooks

Webhook Verification

All inbound webhooks verified via HMAC-SHA256 signature before processing.
Idempotency enforcement prevents replay attacks.
Events processed exactly once.

Secrets

Secret Management

All secrets loaded from environment variables.
No credentials in configuration files, source control, or container images.
Error responses never expose internal paths, stack traces, or key material.

Availability

Availability

Connection pooling, request timeouts, and circuit-breaking on backend failures.
Shared state backed by Redis with graceful degradation if unavailable.
Stateless gateway design supports horizontal scaling.

Incident Response

Incident Response

Security issues: [email protected]
48-hour acknowledgment SLA.
Critical vulnerabilities patched within 24–72 hours.
Coordinated disclosure supported.

Compliance

Compliance

Architecture designed to support HIPAA, SOC 2, and FedRAMP control requirements. Formal audit engagement available on request for enterprise customers.

Questions about our security posture?