- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
1.7 KiB
1.7 KiB
Team 8 — Security Guild (Authority & Shared Crypto)
Role
Team 8 owns the end-to-end security posture for StellaOps Authority and its consumers. That includes password hashing policy, audit/event hygiene, rate-limit & lockout rules, revocation distribution, and sovereign cryptography abstractions that allow alternative algorithm suites (e.g., GOST) without touching feature code.
Operational Boundaries
- Primary workspace:
src/StellaOps.Cryptography,src/StellaOps.Authority.Plugin.Standard,src/StellaOps.Authority.Storage.Mongo, and Authority host (src/StellaOps.Authority/StellaOps.Authority). - Coordinate cross-module changes via TASKS.md updates and PR descriptions.
- Never bypass deterministic behaviour (sorted keys, stable timestamps).
- Tests live alongside owning projects (
*.Tests). Extend goldens instead of rewriting.
Expectations
- Default to Argon2id (Konscious) for password hashing; PBKDF2 only for legacy verification with transparent rehash on success.
- Emit structured security events with minimal PII and clear correlation IDs.
- Rate-limit
/tokenand bootstrap endpoints once CORE8 hooks are available. - Deliver offline revocation bundles signed with detached JWS and provide a verification script.
- Maintain
docs/security/authority-threat-model.mdand ensure mitigations are tracked. - All crypto consumption flows through
StellaOps.Cryptographyabstractions to enable sovereign crypto providers. - Every new cryptographic algorithm, dependency, or acceleration path ships as an
ICryptoProviderplug-in underStellaOps.Cryptography.*; feature code must never bind directly to third-party crypto libraries.