Security & Compliance

Security shield with encryption and padlock symbols

Encryption, access control, and data sovereignty embedded in every layer of the platform. Every customer gets the same security posture.

Encryption

All data protected at rest and in transit with industry-standard encryption.

Data at Rest

  • Block Storage — Ceph-backed encryption at the storage layer
  • Secrets — AES-256 with dedicated Key Encryption Key
  • Object Storage — Server-side encryption for S3 buckets
  • Backups — Inherit encryption from source resources

Data in Transit

  • TLS 1.2+ — All API endpoints and dashboard connections
  • HAProxy Gateway — Modern cipher suites at TLS termination
  • Internal Encryption — Service-to-service communication encrypted
  • Console Sessions — noVNC encrypted end-to-end

Key Management

  • AES-256 — Platform-managed Key Encryption Key
  • Server-Side Generation — Keys never transit to your browser
  • Multiple Types — Symmetric, asymmetric, certificates, passphrases
  • Auto-Hide — Revealed payloads hide after 30 seconds

Identity & Access Control

Enterprise authentication with SSO federation and granular role-based access.

Authentication

  • Single Sign-On — SAML 2.0, OIDC, and LDAP/AD federation
  • Multi-Factor Authentication — TOTP or WebAuthn enforcement
  • PKCE Flow — No passwords stored by the dashboard
  • Session Management — Configurable timeouts with real-time revocation

Authorization

  • Six RBAC Roles — Org Admin, Project Admin, Member, Reader, Security, Auditor
  • API-Level Enforcement — Not just UI restrictions, unauthorized API calls return 403
  • Project Isolation — Resources invisible across project boundaries
  • Credential Management — API tokens, EC2 keys, SSH keys with rotation support
RoleScopeAccess Level
Org AdminOrganizationAll projects, users, billing, settings
Project AdminProjectFull access within one project
MemberProjectCreate and manage resources
ReaderProjectView-only access
SecurityProjectFirewalls and secrets only
AuditorOrganizationRead-only everywhere, audit logs

Network Security

Tenant isolation and enterprise-grade firewall management.

Network topology illustration showing routers, nodes, and secure connections representing Open Edge networking infrastructure

Tenant Isolation

  • Virtual Networks — Isolated per tenant with no cross-tenant visibility
  • OVN SDN — Distributed virtual routing with hardware-accelerated datapath
  • Port Security — Anti-spoofing prevents MAC and IP impersonation

Firewall Management

  • Ingress & Egress Rules — Protocol, port, and source/destination control
  • Traffic Simulator — Validate policy before deployment
  • Effective Rules View — Merged policy across all attached groups
  • Shadowed Rule Detection — Identify ineffective rules
  • Permissive Rule Warnings — Flag rules open to 0.0.0.0/0

Data Sovereignty

US jurisdiction. Contractual guarantees. Full transparency.

  • US-Only Infrastructure — All resources physically in US data centers
  • US-Person Access — Managed by US-based personnel
  • No Foreign Replication — Data never leaves US jurisdiction
  • Contractual Residency Guarantees — Included in every agreement

Regulatory-Ready Architecture

Our infrastructure is designed to support workloads subject to regulatory requirements, including:

  • ITAR — US-person access and US-soil data residency
  • CMMC — Security controls for defense contractor workloads
  • State Privacy Laws — CCPA/CPRA, VCDPA, and other state-level requirements
  • HIPAA — Architecture supports HIPAA-eligible workloads
  • SOX — Audit trail and access control capabilities
US map with secure data nodes representing Open Edge US data sovereignty and compliance

Infrastructure Security

Physical, platform, and operational security at every layer.

Physical Security

Open Edge infrastructure is deployed in enterprise-grade US data centers: Iron Mountain VA-1 (Manassas, VA) and STACK Infrastructure POR02A (Hillsboro, OR — coming Q2 2026).

  • 24/7 on-site security and surveillance
  • Biometric access controls
  • Redundant power (N+1 UPS + generators)
  • Redundant cooling systems
  • Fire detection and suppression
  • Multiple network uplinks with BGP peering

Platform Architecture

  • Multi-node control plane with automatic failover
  • HAProxy gateway with TLS and health checks
  • Ceph replicated storage across nodes
  • Kolla-Ansible automated, auditable deployment

Monitoring & Response

  • Prometheus continuous metrics collection
  • Configurable threshold-based alerting
  • Alert lifecycle with full audit history
  • 24/7 proactive operations team

Shared Responsibility

Clear boundaries between what we manage and what you manage.

ResponsibilityOpen EdgeCustomer
Physical data center securityOurs
Network infrastructureOurs
Hypervisor and control planeOurs
Platform updates and maintenanceOurs
Encryption at rest and in transitOurs
Monitoring and alertingOurs
Incident communicationOurs
Firewall rule configurationYours
Application securityYours
Data classificationYours
User access managementSharedShared
Compliance documentationSharedShared
Backup verificationSharedShared

Security Practices

How we operate, and where we are in our compliance journey.

Open Edge follows SOC 2 and ISO 27001 control frameworks across our operations — including access management, change control, incident response, encryption, and monitoring. While we have not yet undergone formal third-party certification audits, our platform is built and operated according to these standards.

We maintain transparency about where we are in our compliance journey. If your organization has specific certification requirements or timelines, contact us to discuss your needs.

Our team is available to discuss your security and compliance requirements in detail. We are happy to answer security questionnaires and walk through our controls with your team.