Security and Compliance Domain

Vision

Security and Compliance is the trust layer of the Enterprise Platform. It provides the identity foundation, access governance, audit trail, and data privacy controls that allow customers in regulated industries to adopt the platform with confidence. The domain operates as a shared service across all other domains — every API call passes through IAM, every privileged action lands in the audit log — making security a structural property of the platform rather than a bolt-on.

Team

Role Name Contact
Domain Architect Sophie Laurent #arch-security
Tech Lead Raj Krishnamurthy #team-security-eng
Product Owner Nina Johansson #product-compliance

Slack Channels:

  • #arch-security — Architecture discussions, threat modelling, ADRs
  • #team-security-eng — Engineering team channel
  • #incidents-security — Security incidents, IAM failures, certificate alerts

Tech Stack

Layer Technology Notes
IAM Platform Keycloak (self-hosted) OIDC/SAML federation, SCIM provisioning, MFA enforcement
Policy Engine Open Policy Agent (OPA) RBAC + ABAC policy evaluation, embedded in service mesh
Secrets Management HashiCorp Vault Encryption keys, service credentials, certificate lifecycle
Audit Trail Elasticsearch + Kafka Immutable event stream, tamper-evident log storage
Privacy Management Python + FastAPI GDPR subject rights API, data erasure workflows
Monitoring Datadog + Falco Runtime security alerts, anomaly detection

Architecture Decisions

  • ADR-001: OPA for fine-grained authorization (Accepted) — Authorization decisions are delegated to OPA running as a sidecar. Policies are authored in Rego, version-controlled alongside the registry, and evaluated in-process without network round-trips. This separates policy from application code and enables policy-as-code reviews in pull requests.
  • ADR-002: Kafka as the audit log backbone (Accepted) — All audit events are published to a dedicated Kafka topic before any application response is returned. Downstream consumers index into Elasticsearch for search and archive to S3 (with object lock) for tamper-evident long-term retention. No audit record is ever mutated or deleted.
  • ADR-003: Vault for all secrets and certificates (Accepted) — No service may read secrets from environment variables or config files in production. All credentials are fetched at runtime via Vault's Kubernetes auth method, with automatic rotation enforced by TTL policies. Certificate lifecycle is managed via Vault PKI to eliminate manual renewal toil.

Roadmap

Quarter Item
Q1 2026 SOC 2 Type II evidence automation — continuous evidence collection mapped to controls
Q2 2026 GDPR erasure SLA enforcement — automated right-to-erasure workflow with < 30-day SLA
Q3 2026 Zero-trust service mesh — mTLS enforced between all internal services via Istio + OPA
Q4 2026 ISO 27001 gap assessment and remediation — readiness for formal certification audit

Key Links

  • Confluence: Security Architecture Space
  • Runbook: IAM Incident Response and Certificate Rotation Runbook
  • API Docs: IAM Platform at /catalog/software_system--iam-platform
  • Monitoring Dashboard: Datadog - Security and Compliance Overview

SLOs

Metric Target Current
IAM token validation p99 latency < 50ms 38ms
Audit event delivery lag < 10s 6.4s
Secrets rotation success rate > 99.9% 100%
Uptime 99.99% 99.99%