We believe security is simply good engineering

Atlantas is built for teams that need to hand infrastructure automation to AI agents without losing sleep. Every layer of the stack is designed around isolation, least-privilege, and auditability.

Tenant Isolation

Every tenant is a security boundary. A single key compromise never exposes other tenants.

  • PostgreSQL Row-Level Security on every tenant-scoped table
  • K8s NetworkPolicies prevent cross-namespace traffic
  • Per-tenant HKDF-SHA256 key derivation for credential encryption
  • A single key compromise never exposes other tenants

Authentication & Access Control

Flexible authentication with strict session management and role-based permissions.

  • Email/password + Google OAuth + GitHub OAuth + generic OIDC + SAML
  • Short-lived JWTs (15 min) with refresh tokens in httpOnly cookies
  • Role-based access: admin, operator, read-only, billing-admin
  • Silicon identities for agents — distinct from human users

Credential Security

Secrets are encrypted at rest and never exposed in API responses.

  • All secrets encrypted at rest with per-tenant Fernet keys
  • Key versioning for future rotation support
  • Secrets never exposed in API responses (masked output)
  • SSO client secrets, cloud credentials, GitHub keys — all encrypted

Evaluation Pipeline

Every Terraform plan passes through policy-as-code checks before it can be applied.

  • OPA policy-as-code checks on every plan
  • tfsec security scanning catches misconfigurations
  • Hard blocks cannot be overridden — fix in code
  • Soft blocks require explicit admin/operator override, logged in audit trail

Audit Trail

Full observability over every action, by every actor, across every tenant.

  • Every API call logged (reads and mutations)
  • Structured events: actor, tenant, action, resource, timestamp, result
  • Agent actions attributed to specific silicon identities
  • CSV/JSON export for compliance reporting

Infrastructure

Hardened deployment defaults with minimal attack surface.

  • Kubernetes deployment with Helm charts
  • Non-root containers, security contexts
  • Docker multi-stage builds with minimal attack surface

Have security questions?

We’re happy to walk through our security architecture, share our threat model, or discuss specific compliance requirements.

Contact Security Team