You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Project Forge implements defense-in-depth security following AWS Well-Architected Framework and industry best practices for regulated industries like Finance and Defence.
Network Security
VPC Architecture
Private Subnets: All workloads run in private subnets without direct internet access
NAT Gateways: Outbound internet access controlled through NAT
VPC Flow Logs: All network traffic logged for auditing
Security Groups
# Example: EKS Node Security Group- Ingress from control plane only
- Ingress from other nodes (pod-to-pod)
- No direct public access
Network Policies (Kubernetes)
# Deny all by defaultapiVersion: networking.k8s.io/v1kind: NetworkPolicymetadata:
name: default-deny-allspec:
podSelector: {}policyTypes:
- Ingress
- Egress
Identity and Access Management
AWS IAM
Principle of Least Privilege: Minimal permissions for each role
Service-Linked Roles: Specific roles for EKS, ECS, etc.
IAM Roles for Service Accounts (IRSA): Pod-level AWS permissions
Kubernetes RBAC
# Example: Read-only role for developerskind: Rolemetadata:
name: developerrules:
- apiGroups: [""]resources: ["pods", "services", "configmaps"]verbs: ["get", "list", "watch"]
Data Protection
Encryption at Rest
Resource
Encryption Method
S3 Buckets
AES-256 / KMS
EBS Volumes
KMS
Kubernetes Secrets
KMS via EKS
DynamoDB
KMS
Elasticsearch
KMS
Encryption in Transit
All internal communication uses TLS 1.2+
Load balancer terminates external TLS
Service mesh (optional) for mTLS
Key Management
# KMS key with rotationresource"aws_kms_key""main" {
enable_key_rotation=truedeletion_window_in_days=30
}