← Back to Home

Security Architecture & Roadmap

SecureAssure Platform Security Documentation | Last Updated: March 2026

1. Encryption Posture

Data in Transit LIVE

All communications use TLS 1.2+ via HTTPS. WebSocket connections (Socket.IO) are encrypted over WSS. No plaintext HTTP connections accepted in production.

Data at Rest LIVE

PostgreSQL database encrypted at storage layer. Client-side data stored in localStorage with application-level ECDSA P-256 signatures via Web Crypto API for integrity verification.

Key Management LIVE

Per-user ECDSA P-256 keypairs generated locally using Web Crypto API. Private keys never leave the device. Public key hashes registered server-side for identity verification.

2. Threat Model

Attack Surface Analysis

VectorThreatMitigationStatus
API EndpointsInjection, abuse, DDoSInput validation (Zod schemas), IP-based rate limiting (10 req/hr for reports, 30/hr for reputation), request size limitsLIVE
Community ReportsFalse reports, spam, coordinated manipulationTrust scoring, community voting, auto-flagging (3+ downvotes at 3:1 ratio), IP tracking, rate limitingLIVE
Client-Side DatalocalStorage tampering, XSSCSP headers, crypto-signed data integrity checks, no inline script execution, input sanitizationLIVE
WebSocketMessage spoofing, session hijackWSS encryption, session-bound Socket.IO with reconnection tokens, server-side message validationLIVE
File UploadsMalware, oversized filesType validation (60+ allowed types), size limits, filename sanitization, server-side MIME checkingLIVE
AuthenticationCredential stuffing, brute forceBcrypt password hashing, rate-limited login attempts, Stripe-integrated session managementLIVE

3. Role-Based Access Control (RBAC)

Architecture

The platform implements multi-tier access control:

RoleAccess LevelCapabilities
Public UserFree TierCore safety features, community reporting, basic monitoring
Pro UserSubscriptionTracker detection, deep scan, advanced analytics, travel safety
Enterprise OperatorOrganizationATLAS platform access, multi-user coordination, mission profiles, federal data feeds
Mission CommanderProfile-BasedRole-filtered dashboards (Emergency Manager, SAR Lead, Cyber Analyst, Field Engineer)
Defense OperatorAccess-GatedDefense modules require explicit access code authentication; separated from civilian capabilities
Defense capabilities are firewalled behind an access gate. Civilian users never see defense-related modules, terminology, or data. This separation is enforced at the application layer with localStorage-based session management and will be enhanced with server-side RBAC in the enterprise deployment.

4. Audit Logging

Immutable Event Tracking

All security-relevant actions are recorded in an append-only audit log stored in PostgreSQL:

Audit logs include: timestamp, actor identifier, action type, resource affected, request details, and source IP address. Logs are queryable via API with pagination and filtering support.

5. Data Retention Policy

Data TypeRetentionPurge Method
Community safety reports365 daysAuto-archive after expiry, manual purge on request
Panic events365 daysImmutable for investigation period, then archived
Audit logs730 days (2 years)Append-only, no modification permitted
Session/analytics data90 daysRolling window, aggregated then purged
Client-side localStorageUser-controlledData Ownership Dashboard provides one-click purge
Reputation database180 days per entryCrowd-sourced data refreshed continuously
Uploaded files/media30 days or sessionAuto-cleanup on session end or TTL expiry

6. SOC 2 Readiness Roadmap

Trust Service Criteria: Security IN PROGRESS

TLS encryption, input validation, rate limiting, RBAC, audit logging, vulnerability scanning pipeline.

Trust Service Criteria: Availability IN PROGRESS

Offline-first PWA architecture, service worker caching, multi-CDN static hosting, health monitoring endpoints.

Trust Service Criteria: Confidentiality PLANNED

Data classification framework, encryption key rotation, DLP controls, access review procedures.

Trust Service Criteria: Processing Integrity PLANNED

Input validation pipeline, data quality checks, error handling with client error reporting, reconciliation procedures.

Trust Service Criteria: Privacy IN PROGRESS

Privacy impact assessment, consent management, data minimization, user-controlled data export and purge.

7. Disaster Recovery Architecture

Recovery Objectives

MetricTargetStrategy
RTO (Recovery Time Objective)< 4 hoursAutomated redeployment from version control, database point-in-time recovery
RPO (Recovery Point Objective)< 1 hourContinuous PostgreSQL WAL archiving, real-time backup
Offline ResilienceIndefinitePWA service worker caches core functionality, local data survives server outage

The offline-first architecture ensures critical safety features (panic button, SafeWalk, tracker detection, cached maps) remain operational during server downtime. Data queued offline syncs automatically on reconnection.

8. Penetration Testing Plan

9. Classification Boundary Statement

Civilian Mode (Default): All platform content, data, and capabilities are UNCLASSIFIED and suitable for public use. No controlled unclassified information (CUI), no export-controlled data, no classified material. Federal data feeds (NASA, FEMA, USGS, NOAA, CISA) are all public APIs.
Defense Mode (Access-Gated): When defense capabilities are activated via access gate, the platform operates at UNCLASSIFIED // FOR OFFICIAL USE ONLY level. No classified data is processed, stored, or transmitted. Defense features provide planning and decision-support tools only. Operational use requires organizational deployment with appropriate security controls.

10. Performance Benchmarks

MetricTargetMeasured
Initial Page Load (PWA)< 3s on 3G~2.1s (cached), ~3.4s (first load)
WebSocket Connection< 500ms~120ms (domestic), ~400ms (international)
Federal Data Feed Latency< 5s per source~1-3s (NASA, USGS, NOAA), ~2-5s (FEMA, CISA)
Offline Cache Size< 50MB~12MB core + map tiles variable
Concurrent Users (Socket.IO)100+ per roomTested to 50 concurrent; horizontal scaling via Redis adapter planned
Audit Log Write< 50ms~8ms average (async, non-blocking)

11. Deployment Tiers

Tier 1: Cloud PWA LIVE

Browser-based deployment via Replit/cloud hosting. No installation required. Suitable for evaluation, training, and civilian operations.

Tier 2: On-Premise Server PLANNED

Self-hosted Node.js + PostgreSQL on organizational infrastructure. Full data sovereignty. Air-gapped network compatible.

Tier 3: Containerized ROADMAP

Docker/Kubernetes deployment for elastic scaling. Helm charts for automated provisioning. STIG-hardened base images.

SecureAssure - Veteran-Owned | security@secureassure.com