Evose
Security

6-Layer Defense

Network · Auth · Access · Data · Audit · Compliance

Complete defense in depth = every layer assumes the layer above may have been breached.

┌──────────────────────────────────────────────┐
│  6. Compliance  MLPS · GDPR · ISO 27001       │
├──────────────────────────────────────────────┤
│  5. Audit       Tamper-proof operation logs    │
├──────────────────────────────────────────────┤
│  4. Data        At-rest · field-level encryption │
├──────────────────────────────────────────────┤
│  3. Access      RBAC + ACL                     │
├──────────────────────────────────────────────┤
│  2. Auth        SSO + email + strong password  │
├──────────────────────────────────────────────┤
│  1. Network     HTTPS / TLS · DDoS             │
└──────────────────────────────────────────────┘

Layer 1 · Network

ControlImplementation
HTTPS / TLS 1.3Mandatory encryption for external traffic; only TLS 1.2+, legacy disabled
HSTSStrict-Transport-Security: max-age=31536000
CDN / DDoSProvided by Evose for SaaS; for Private, integrate corp WAF / Cloudflare
IP allowlistOptional for the admin console, restrict ops entry
Network segmentationPrivate: K8s NetworkPolicy isolates namespaces; DB internal-only ACLs

Layer 2 · Authentication

ControlImplementation
SSOOAuth 2.0 (supported); LDAP / AD / SAML / MFA (planned)
Email + passwordbcrypt hash · password strength · failure lockout
Session managementJWT + Refresh Token · configurable max concurrent devices
API Key (outbound)Platform-level / workspace-level · revocable · rate-limited

Layer 3 · Access

ControlImplementation
RBACRole → system / workspace permissions
ACL4-level resource permissions (view / use / edit / manage)
Resource policyCross-workspace global rules complementing RBAC + ACL
Workspace isolationData / resource / observability — fully isolated by default
Least privilegeDefault deny; explicit grants

Roles · Resource policy

Layer 4 · Data

ControlImplementation
At restAES-256 full-table DB encryption (Private may use TDE)
Field-levelIndependent keys for credentials / sensitive fields
In transitEnd-to-end TLS 1.3; mTLS between internal services (recommended on K8s)
Key managementMaster key (SECRET_KEY) stored carefully; external KMS support (planned)
Data isolationWorkspace-level logical (SaaS) / physical (full-stack Private)

Data isolation in detail

Layer 5 · Audit

ControlImplementation
Operation logAll writes / sensitive reads / permission changes
Tamper-proofWrite-once read-only; replicate to external SIEM
RetentionDefault 90 days, extendable to 7 years for compliance
TraceabilityWho / when / what / which resources affected

Desktop audit events

Layer 6 · Compliance

StandardStatus
MLPS (China's Multi-Level Protection Scheme)Level 2 ✓ · Level 3 ✓
GDPR (EU)
ISO 27001
HIPAA (U.S. healthcare)Achievable under Private with proper setup
SOC 2 Type IIRoadmap

Compliance checklist

Penetration Testing

  • Third-party penetration testing: at least annually
  • Vulnerability disclosure: security@evose.ai (private)
  • Response SLA: Critical 24h · High 72h · Medium 7d

Security Update Flow

Vulnerability discovered → severity assessment → internal fix → security advisory → patch push:

SeverityPush
Critical (RCE / data leak)Emergency patch within 24-48h
HighRegular release within 1 week
Medium / LowNext regular release

Next Steps

On this page