UNCLASSIFIED
UNCLASSIFIED
← Back to Home

Zero-Trust Security Architecture & Compliance Roadmap

ISS LLC / SecureAssure Platform Security Documentation | CMMC 2.0 Level 2 | FedRAMP Moderate | NIST CSF 2.0 | Last Updated: March 2026

1. Encryption Posture

Data in Transit LIVE

All communications use TLS 1.2+ via HTTPS. WebSocket connections (Socket.IO) are encrypted over WSS. No plaintext HTTP connections accepted in production.

Data at Rest LIVE

PostgreSQL database encrypted at storage layer. Client-side data stored in localStorage with application-level ECDSA P-256 signatures via Web Crypto API for integrity verification.

Key Management LIVE

Per-user ECDSA P-256 keypairs generated locally using Web Crypto API. Private keys never leave the device. Public key hashes registered server-side for identity verification.

2. Threat Model

Attack Surface Analysis

VectorThreatMitigationStatus
API EndpointsInjection, abuse, DDoSInput validation (Zod schemas), IP-based rate limiting (10 req/hr for reports, 30/hr for reputation), request size limitsLIVE
Community ReportsFalse reports, spam, coordinated manipulationTrust scoring, community voting, auto-flagging (3+ downvotes at 3:1 ratio), IP tracking, rate limitingLIVE
Client-Side DatalocalStorage tampering, XSSCSP headers, crypto-signed data integrity checks, no inline script execution, input sanitizationLIVE
WebSocketMessage spoofing, session hijackWSS encryption, session-bound Socket.IO with reconnection tokens, server-side message validationLIVE
File UploadsMalware, oversized filesType validation (60+ allowed types), size limits, filename sanitization, server-side MIME checkingLIVE
AuthenticationCredential stuffing, brute forceBcrypt password hashing, rate-limited login attempts, Stripe-integrated session managementLIVE

3. Zero-Trust Role-Based Access Control (RBAC)

Architecture

The platform implements zero-trust, multi-tier access control aligned with NIST SP 800-207 Zero Trust Architecture and CMMC 2.0 Level 2 requirements:

RoleAccess LevelCapabilities
Public UserFree TierCore safety features, community reporting, basic monitoring
Pro UserSubscriptionTracker detection, deep scan, advanced analytics, travel safety
Enterprise OperatorOrganizationATLAS platform access, multi-user coordination, mission profiles, federal data feeds
Mission CommanderProfile-BasedRole-filtered dashboards (Emergency Manager, SAR Lead, Cyber Analyst, Field Engineer)
Defense OperatorAccess-GatedDefense modules require explicit access code authentication; separated from civilian capabilities
Defense capabilities are firewalled behind zero-trust access gate. Civilian users never see defense-related modules, terminology, or data. MOSA-compliant separation enforced at the application layer. CMMC 2.0 Level 2 compliant access controls with mission-based cyber risk assessment (DoWM 5000.103).

4. Audit Logging

Immutable Event Tracking

All security-relevant actions are recorded in an append-only audit log stored in PostgreSQL:

Audit logs include: timestamp, actor identifier, action type, resource affected, request details, and source IP address. Logs are queryable via API with pagination and filtering support.

5. Data Retention Policy

Data TypeRetentionPurge Method
Community safety reports365 daysAuto-archive after expiry, manual purge on request
Panic events365 daysImmutable for investigation period, then archived
Audit logs730 days (2 years)Append-only, no modification permitted
Session/analytics data90 daysRolling window, aggregated then purged
Client-side localStorageUser-controlledData Ownership Dashboard provides one-click purge
Reputation database180 days per entryCrowd-sourced data refreshed continuously
Uploaded files/media30 days or sessionAuto-cleanup on session end or TTL expiry

6. SOC 2 Readiness & Compliance Framework Roadmap

Trust Service Criteria: Security IN PROGRESS

TLS encryption, input validation, rate limiting, RBAC, audit logging, vulnerability scanning pipeline.

Trust Service Criteria: Availability IN PROGRESS

DDIL-capable (Denied, Disrupted, Intermittent, Limited) PWA architecture, service worker caching, multi-CDN static hosting, health monitoring endpoints. Full mission functionality in contested environments.

Trust Service Criteria: Confidentiality PLANNED

Data classification framework, encryption key rotation, DLP controls, access review procedures.

Trust Service Criteria: Processing Integrity PLANNED

Input validation pipeline, data quality checks, error handling with client error reporting, reconciliation procedures.

Trust Service Criteria: Privacy IN PROGRESS

Privacy impact assessment, consent management, data minimization, user-controlled data export and purge.

7. Disaster Recovery Architecture

Recovery Objectives

MetricTargetStrategy
RTO (Recovery Time Objective)< 4 hoursAutomated redeployment from version control, database point-in-time recovery
RPO (Recovery Point Objective)< 1 hourContinuous PostgreSQL WAL archiving, real-time backup
DDIL ResilienceIndefiniteDDIL-capable PWA service worker caches core functionality. Full mission operations in denied, disrupted, intermittent, limited environments

The DDIL-capable architecture ensures critical safety features (panic button, SafeWalk, tracker detection, cached maps) remain mission-assured during server downtime and in contested environments. Data queued offline syncs automatically on reconnection with zero-trust integrity verification.

8. Penetration Testing Plan

9. Classification Boundary Statement

Civilian Mode (Default): All platform content, data, and capabilities are UNCLASSIFIED and suitable for public use. No controlled unclassified information (CUI), no export-controlled data, no classified material. Federal data feeds (NASA, FEMA, USGS, NOAA, CISA) are all public APIs.
Defense Mode (Zero-Trust Access-Gated): When defense capabilities are activated via zero-trust access gate, the platform operates at UNCLASSIFIED // FOR OFFICIAL USE ONLY level. MOSA-compliant, JADC2-aligned architecture. CMMC 2.0 Level 2 compliant. Mission-based cyber risk assessment (DoWM 5000.103). No classified data processed, stored, or transmitted. Operational use requires organizational deployment with appropriate security controls.

10. Performance Benchmarks

MetricTargetMeasured
Initial Page Load (PWA)< 3s on 3G~2.1s (cached), ~3.4s (first load)
WebSocket Connection< 500ms~120ms (domestic), ~400ms (international)
Federal Data Feed Latency< 5s per source~1-3s (NASA, USGS, NOAA), ~2-5s (FEMA, CISA)
Offline Cache Size< 50MB~12MB core + map tiles variable
Concurrent Users (Socket.IO)100+ per roomTested to 50 concurrent; horizontal scaling via Redis adapter planned
Audit Log Write< 50ms~8ms average (async, non-blocking)

11. Deployment Tiers

Tier 1: Cloud PWA LIVE

Browser-based deployment via Replit/cloud hosting. No installation required. Suitable for evaluation, training, and civilian operations.

Tier 2: On-Premise Server PLANNED

Self-hosted Node.js + PostgreSQL on organizational infrastructure. Full data sovereignty. Air-gapped network compatible.

Tier 3: Containerized ROADMAP

Docker/Kubernetes deployment for elastic scaling. Helm charts for automated provisioning. STIG-hardened base images.

ISS LLC / SecureAssure (SDVOSB) | Software-Defined | MOSA-Compliant | JADC2-Aligned | CMMC 2.0 L2 | security@secureassure.com

CHEATSHEET
ASK AI
PRESENCE
⚠ SANDBOX / TRAINING MODE — Live read-only data. Write commands are inhibited (train as you fight, missile button safed).