Security Overview
Security Principles
- Defense in depth - Multiple layers of security
- Least privilege - Minimal access required
- Encryption everywhere - Data protected at rest and in transit
- Audit everything - Log security-relevant events
Security Architecture
| Layer | Controls |
|---|---|
| Network | 3-VPC isolation, security groups, no public DB |
| Authentication | AWS Cognito, JWT validation |
| Authorization | RBAC, project-level access |
| Data | AES-256 encryption, TLS 1.2+ |
| CI/CD | OIDC, security scanning, approval gates |