Files
git.stella-ops.org/StellaOps.Authority.TODOS.Security.md

2.7 KiB
Raw Blame History

StellaOps Authority — Security Guild Plan

Read first: AGENTS.md, StellaOps.Authority.TODOS.md, and this plan. Track progress in both TODO files.

Mission

Define and verify the security posture of StellaOps Authority: password/secret policies, audit logging, throttling, threat modelling, and offline revocation guarantees.

Task Breakdown

Order Task IDs Description Dependencies Acceptance
1 SEC1 Select and configure password hashing (Argon2 preferred) + identity lockout parameters; contribute config defaults. PLG3, CORE3 Hash verified via unit test + red team review.
2 SEC2 Specify audit log schema/content (principal, client, scopes, IP) and ensure Authority Core implementation meets requirements. CORE5CORE7 Review sample logs; ensure PII handled safely.
3 SEC3 Define lockout & rate limit policies (per user/IP) and validate implementation in Authority Core. CORE8 Test harness proves lockouts triggered appropriately.
4 SEC4 Design offline revocation list format + signing procedure; review implementation with Core/DevOps. CORE9, OPS3 Provide verification script for downstream systems.
5 SEC5 Conduct threat model / security review (STRIDE) covering plugins, token flows, admin endpoints; produce mitigation backlog if needed. CORE1CORE10 Document stored in /docs/security.
6 Oversight Perform security review of CLI/Feedser integration changes (token handling, bypass masks). FSR2, CLI2 Approve PRs or request hardening changes.

Implementation Notes

  • Require secrets (client, bootstrap API keys) to meet minimum entropy; document rotation expectations.
  • Ensure bypass mask usage is fully logged + alertable.
  • Recommend default TLS cipher suites for Authority deployments.
  • Validate plugin capability metadata doesnt expose insecure combinations (e.g., plugin without password support cannot be selected for password grant).
  • Develop checklist for production readiness (penetration test, log review, key rotation rehearsal).

Deliverables

  • Security configuration recommendations (encoded in options + documentation).
  • Approved audit log schema & sample records.
  • Threat model document + mitigation backlog (if gaps discovered).
  • Sign-off memo to enable production rollout.

Coordination

  • Work closely with Authority Core and Plugin teams during implementation; request changes early.
  • Pair with DevOps on key rotation / secret storage solutions.
  • Review Docs to ensure operator guidance includes security-critical steps.
  • Attend weekly Auth Guild sync to surface risks/blockers.