Security

This section is the umbrella for the platform's security architecture — the defense-in-depth model that runs across cloud platforms (AWS, Snowflake, Databricks), network perimeters (firewalls, fail2ban, WAF), and AI/ML inference paths (prompt-injection defense, confidential compute, audit-log integrity). Security here is treated as a system-design constraint, not a checklist: classification drives routing, identity gates every call, and every action is recorded in an append-only log that can be replayed during a compliance review.

The diagram below shows the seven layers of the model. Each layer is a control surface with its own primitives — the cloud-specific names appear inside each layer box. The subsections that follow link out to the per-platform deep dives and the two cross-cutting reference pages (OWASP Top 10 for LLMs and Zero-Trust AI Architecture) that span all platforms.


1. Defense-in-Depth Layered Model

Seven layers, top to bottom. Every inbound request crosses every layer; every outbound response carries audit evidence back through them. Misses at one layer should be caught at the next — that is the defense-in-depth invariant.

┌──────────────────────────────────────────────────────────────────────────────┐
│           1. EXTERNAL BOUNDARY  (Internet, Threats, Supply Chain)            │
│  ┌────────────┐  ┌────────────┐  ┌────────────┐  ┌────────────┐              │
│  │  Public    │  │  Threat    │  │   Model    │  │   OSS /    │              │
│  │  Internet  │  │  Actors    │  │  Providers │  │  Vendors   │              │
│  └────────────┘  └────────────┘  └────────────┘  └────────────┘              │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                2. NETWORK LAYER  (Perimeter & Edge Controls)                 │
│  ┌─────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────┐             │
│  │   WAF   │  │  Shield  │  │PrivateLnk│  │   VPC    │  │ fail │             │
│  │  /CDN   │  │ (DDoS)   │  │   /VPCe  │  │  /Subnet │  │ 2ban │             │
│  └─────────┘  └──────────┘  └──────────┘  └──────────┘  └──────┘             │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                  3. IDENTITY & ACCESS  (Who & What May Act)                  │
│  ┌────────┐  ┌────────┐  ┌────────┐  ┌────────┐  ┌──────────┐                │
│  │  IAM   │  │  SSO   │  │  MFA   │  │ RBAC / │  │ Service  │                │
│  │ Roles  │  │ /OIDC  │  │/WebAuth│  │  ABAC  │  │Principals│                │
│  └────────┘  └────────┘  └────────┘  └────────┘  └──────────┘                │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│              4. DATA PROTECTION  (At Rest, In Transit, In Use)               │
│  ┌──────────┐  ┌─────────┐  ┌──────────┐  ┌──────────┐  ┌─────┐              │
│  │  KMS /   │  │ TLS 1.3 │  │  Tokeniz │  │  Masking │  │ FPE │              │
│  │  CMK     │  │  mTLS   │  │   /Pseud │  │ /Redact  │  │ FF1 │              │
│  └──────────┘  └─────────┘  └──────────┘  └──────────┘  └─────┘              │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│              5. INFERENCE / TRUST BOUNDARY  (Model & Tool Use)               │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌─────────────┐                   │
│  │  Prompt  │  │  Output  │  │  Tool    │  │ Confidential│                   │
│  │ Injectn  │  │  Filter  │  │ Allowlist│  │   Compute   │                   │
│  │ Defense  │  │ /Canary  │  │ /Sandbox │  │ (TDX/SEV)   │                   │
│  └──────────┘  └──────────┘  └──────────┘  └─────────────┘                   │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                6. DETECTION & AUDIT  (Telemetry & Forensics)                 │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌─────────┐  ┌────┐               │
│  │CloudTrail│  │GuardDuty │  │ Hash-    │  │  SIEM   │  │ DLP│               │
│  │ /Audit   │  │/Detective│  │ Chained  │  │ /Splunk │  │    │               │
│  │  Logs    │  │  /WAF    │  │   Logs   │  │ /Sumo   │  │    │               │
│  └──────────┘  └──────────┘  └──────────┘  └─────────┘  └────┘               │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│          7. GOVERNANCE & LIFECYCLE  (Policy, Compliance, Rotation)           │
│  ┌──────────┐  ┌─────────┐  ┌─────────┐  ┌─────────┐  ┌─────┐                │
│  │  Class.  │  │Residency│  │ Right-  │  │   Key   │  │ SBOM│                │
│  │  & Tier  │  │ Routing │  │  to-    │  │Rotation │  │ Sup │                │
│  │ Tagging  │  │ EU/US   │  │ Erasure │  │ /Rewrap │  │Chain│                │
│  └──────────┘  └─────────┘  └─────────┘  └─────────┘  └─────┘                │
└──────────────────────────────────────────────────────────────────────────────┘

How to read this diagram: each layer is an enforcement point that can stop a bad request on its own; the arrows represent the legitimate request path. A prompt-injection attempt that bypasses the network layer should still be caught at the inference / trust boundary. A leaked secret that bypasses identity should still be caught by anomaly detection in the audit layer.


2. AI / ML Security

Controls specific to LLM/RAG/document-intelligence workloads — the inference and trust-boundary layers from the diagram. See the dedicated landing page at Security / AI & ML.


3. AWS Security

Cloud-platform controls for accounts running on AWS — identity, key management, audit, and detection.


4. Snowflake Security

Snowflake-native controls — network policies, RBAC, dynamic masking, row-access policies, tag-based governance.


5. Databricks Security

Databricks-native controls — Unity Catalog, cluster policies, secret scopes, table ACLs, customer-managed keys.


6. Network & Firewall

Perimeter and edge controls — the network layer of the model. Brute-force mitigation, IP allowlists, intrusion prevention.


7. Cross-Cutting References

Two reference pages that span every cloud platform and apply across the entire defense-in-depth stack.


↑ Back to Top