🏛️ System Architecture & Integrity
Our build pipeline enforces a strict cryptographic boundary, ensuring that the FIPS 140-3 module is correctly installed, initialized, and protected from tampering.
We rely on a Hermetic Build philosophy. This means zero external dependencies at build time, byte-for-byte reproducibility, and SLSA Level 3 provenance.
The Cryptographic Boundary
The following architecture diagram illustrates the flow from trusted source ingestion down to the attested deployment artifacts.
graph TD
%% Global Styles
classDef trusted fill:#009688,stroke:#004d40,stroke-width:2px,color:#ffffff;
classDef boundary fill:#ff9800,stroke:#e65100,stroke-width:2px,stroke-dasharray: 6 4,color:#1a1a1a;
classDef attest fill:#3f51b5,stroke:#1a237e,stroke-width:2px,color:#ffffff;
classDef audit fill:#673ab7,stroke:#311b92,stroke-width:2px,color:#ffffff;
classDef artifact fill:#e91e63,stroke:#880e4f,stroke-width:2px,color:#ffffff;
classDef kics fill:#00b0ff,stroke:#01579b,stroke-width:2px,color:#ffffff;
subgraph SAST ["00. Infrastructure SAST"]
K1["KICS Security Audit<br/>'IaC & Dockerfile Static Analysis'"]:::kics
end
subgraph Ingestion ["01. Trusted Ingestion Layer"]
A["Wolfi Base Image<br/>'Pinned Digest'"]:::trusted
B["OpenSSL Core<br/>Source Code"]:::trusted
C["FIPS Module<br/>Validated Source"]:::trusted
end
subgraph FIPS_Boundary ["02. Cryptographic Construction"]
D["Compilation &<br/>Static Linking"]
E["FIPS Install<br/>Integrity Protocol"]
F{"KAT & POST<br/>Integrity Check"}
D --> E --> F
end
subgraph Supply_Chain ["03. Supply Chain Security"]
G["SBOM Generation<br/>'CycloneDX JSON'"]:::attest
N["Dependency Graph<br/>'GitHub Submission'"]:::attest
H["Sigstore Signing<br/>'Keyless OIDC'"]:::attest
I["SLSA Provenance<br/>'Level 3 Verified'"]:::attest
G --> N
end
subgraph Compliance ["04. Compliance Gates (4 Tests per Variant)"]
direction TB
subgraph Gates ["Trivy Security & Policy Engine"]
T1["1. Vulnerability Scan"]
T2["2. CIS Benchmark"]
T3["3. NSA/CISA Guide"]
T4["4. K8s PSS Restricted"]
end
end
subgraph Artifacts ["05. Attested Artifacts"]
J["Standard Image"]:::artifact
K["Distroless Image"]:::artifact
M["Development Image"]:::artifact
end
%% Flow Connections
K1 -->|Audit Blueprints| Ingestion
Ingestion -->|Verify & Build| FIPS_Boundary
FIPS_Boundary -->|Passed Self-Tests| Supply_Chain
Supply_Chain -->|Validate Runtimes| Gates
%% Output to Final Artifacts
Gates --> J
Gates --> K
Gates --> M
%% Failure Path
F -- Failed --> L["Build Aborted"]
style L fill:#f44336,stroke:#b71c1c,color:#ffffff
class FIPS_Boundary boundary
class Gates audit
Runtime Integrity Check (FIPS POST)
The FIPS POST (Power-On Self-Test) happens automatically on startup. If the .so binary is tampered with, the MAC verification fails and the container halts immediately.
Deployment Variants
We provide specialized variants optimized for security and operational flexibility.
| Variant | Image Tag | Base OS | Intended Use Case |
|---|---|---|---|
| Standard | 3.5.5 |
Wolfi | Includes shell (/bin/bash) for debugging and CI pipelines. |
| Distroless | 3.5.5-distroless |
Static | No shell/manager. Pure cryptographic engine for production. |
| Development | 3.5.5-dev |
Wolfi (Dev) | Includes build tools (gcc, make) for compiling apps. |
[ 360° Dependency Visibility]
Our security posture extends beyond the container itself. Every component in our software supply chain is tracked and monitored, including:
- All OS Packages within the
Standard,Distroless, andDevelopmentimages. - The Python (Pipenv) dependencies used for our testing and automation scripts.
- The GitHub Actions (
user/action@vX) that orchestrate our CI/CD pipeline.
Every single one of these components is continuously monitored by the GitHub Dependency Graph and its integrated security advisory database. This provides real-time alerts for any newly discovered vulnerabilities across the entire stack.