Security Whitepaper
This page summarizes the current VaultCrux security model for technical due-diligence and procurement reviews.
Scope and posture
- Covers the production delivery shape documented in the VaultCrux v2.1 plan.
- Describes active controls and defaults, not aspirational roadmap items.
- Complements (does not replace) customer contract terms and data-processing terms.
Core security model
- Tenant isolation: request auth context is tenant-scoped and enforced on server routes.
- Least privilege: role-scoped seat access (
owner,admin,member,viewer) for team operations. - Defense in depth: Shield policy stack enforces capability, taint, approval, and kill-switch controls.
- Replayable evidence: signed receipts provide audit trails for evidence-backed operations.
Encryption and secrets
- Runtime secrets are rendered from Vault and not committed to source control.
- Vault uses raft storage with scheduled backup and restore-test workflows.
- Customer data is protected through tenant-boundary controls and encrypted storage paths.
Authentication and access control
- API/agent mode:
x-api-key+x-tenant-id. - Browser mode: HttpOnly frontdoor session cookie.
- Team seat controls are role-gated and subject to feature flag posture.
- Tenant mismatch checks return a hard authorization failure.
Observability and operational endpoints
/metricsand/build-infoare restricted to tailnet allowlist or authenticated access./readyzremains public for readiness contract compatibility./healthzand/livezremain part of the core operational interface.
Auditability and traceability
- Build metadata includes service version and deploy commit SHA when deployed via standard infra scripts.
- Receipts and proofpack surfaces support replay, verification, and incident review.
- Access/session activity is logged for operational forensics and support workflows.
Vulnerability and incident handling
- Security incidents follow runbook-driven triage, containment, and remediation.
- Flag-controlled rollout supports fast mitigation and rollback when needed.
- Security reports should include impact, affected flow, and reproducible steps.

