Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

README.md

Security Documentation

Version: 1.8.1
Last Updated: May 2026
Target Audience: Security Engineers, DevOps Engineers, Compliance Officers


Overview

This directory contains security documentation for ThemisDB, covering hardening, key management, access control, encryption, compliance, and HSM integration. For the production security hardening checklist and guide, start with the links below.


Quick Navigation

Start Here

Document Purpose
PRODUCTION_HARDENING_CHECKLIST.md Step-by-step checklist for hardening a production deployment
INFORMATION_SECURITY_POLICY.md Organization-wide information security policy
../production/SECURITY.md Production security hardening guide (GPU, TLS, audit logging, HSM, key rotation)
../production/SECURITY_POSTURE.md Security defaults vs. production-hardened settings

Encryption & Key Management

Document Purpose
ENCRYPTION_KEY_MANAGEMENT_POLICY.md Key lifecycle, rotation, and custodian responsibilities
encryption_strategy.md Encryption architecture (at-rest and in-transit)
HSM_IMPLEMENTATION_SUMMARY.md Hardware Security Module integration summary
HSM_PRODUCTION_DEPLOYMENT.md HSM deployment guide for production
HSM_PRODUCTION_SETUP.md Step-by-step HSM setup procedure
HSM_VENDOR_CONFIGURATIONS.md Vendor-specific HSM configuration examples
PKCS11_INTEGRATION.md PKCS#11 interface integration
VAULT_SIGNING_PROVIDER.md HashiCorp Vault signing provider setup

Access Control & Authentication

Document Purpose
access_control_framework.md Role-based access control (RBAC) framework
api_authentication_authorization.md API authentication and authorization patterns
changefeed_authentication.md CDC stream authentication
zero_trust_policy_enforcer.md Zero-trust network policy enforcement

Compliance & Audit

Document Purpose
../production/CHECKLISTS/compliance.md SOC2, GDPR, HIPAA compliance checklists
../production/CHECKLISTS/operational_compliance.md Monthly operational compliance verification
SECURITY_IMPLEMENTATION_SUMMARY.md Summary of implemented security controls
FIND-002_IMPLEMENTATION_SUMMARY.md Security finding FIND-002 remediation

Specialized Topics

Document Purpose
usb_admin_feature.md USB-based admin key feature
usb_admin_implementation_summary.md USB admin implementation details
learnable-rope-security-assessment.md Security assessment for learnable RoPE embeddings

Security Hardening Quick Reference

Mandatory Production Settings

# config.yaml – minimum security baseline
tls:
  enabled: true
  version: "1.3"
  cert_file: "/etc/themis/tls/server.crt"
  key_file: "/etc/themis/tls/server.key"

mtls:
  enabled: true  # for inter-node communication

audit_logging:
  enabled: true
  level: "full"
  output: "/var/log/themis/audit.log"

encryption_at_rest:
  enabled: true
  algorithm: "AES-256-GCM"

Security Checklist (Abbreviated)

  • TLS 1.3 configured for all client connections
  • mTLS enabled for inter-node communication
  • Disk encryption enabled (LUKS or equivalent)
  • Audit logging configured and shipping to SIEM
  • GPU access controls configured (cgroups)
  • Key rotation automated (90-day cycle)
  • HSM integrated for key storage (production)
  • Security monitoring active (Prometheus alerts)
  • Zero-trust network policies applied

→ Full checklist: PRODUCTION_HARDENING_CHECKLIST.md


Compliance Standards

Standard Status Reference
ISO 27001 Implemented INFORMATION_SECURITY_POLICY.md
BSI C5 Implemented Operations Handbook
SOC 2 Type II In progress Compliance Checklist
GDPR Implemented Compliance Checklist
HIPAA Available Compliance Checklist

Incident Response for Security Events

  1. Follow Incident Response Playbook
  2. Consult Security Incident section in RUNBOOKS.md
  3. Execute Rights Revocation procedure if needed

Related Documentation


Document Classification: Internal – Confidential
Review Cycle: Quarterly (mandatory) / After any security incident
Maintained by: Security Team