Zero-Trust
Architecture
The Aegis security model treats disclosure as a governed workflow. We implement cryptographic boundaries and immutable audit trails to protect high-consequence information.
Architecture Matrix
System Specifications
Access Control
Multi-Factor Protocol
Enrollment Requirements
Minimum of 2 enrolled factors required for full account activation. WebAuthn + TOTP is the recommended configuration.
Step-up MFA
Required for key changes, MFA rotation, and administrative actions.
Recovery Codes
One-time codes are argon2 hashed at rest and rotated immediately upon use.
Administrative
Authority Boundaries
RBAC Configuration
- !Posts are immutable and non-deletable by users after release.
- !Legal deletion requires sysadmin + sealed audit trail entry.
- !Moderation scope limited to profiles and KYC workflow.
This document represents the current security posture of the Aegis Protocol. All implementations are subject to third-party audit and formal verification.