Page cover

4. Security Model

4.1 Trust & Threats

Trust Assumptions:

  • Intel/AMD TEE hardware is trustworthy

  • TLS certificates are valid

  • Client devices can verify attestation

  • Platform operator (Secret Network) is non-malicious

Threat Actors:

  1. External Attacker: Attempts to compromise service from internet

  2. Malicious Operator: Service operator attempts to extract keys

  3. Physical Access: Attacker with physical access to hardware

  4. Quantum Computer: Future adversary with CRQC

  5. Insider Threat: Compromised employee or contractor

4.2 Security Guarantees

spinner

Attack Vector Mitigations:

Attack Vector
Mitigation
Verification

Memory inspection

Intel TDX memory encryption

TEE attestation

Code tampering

Measured boot, reproducible builds

Attestation report

Key exfiltration

TEE isolation, no debug interfaces

Remote attestation

Replay attacks

Timestamp validation, nonces

JWT exp claim

Rate limit bypass

Sliding window per-user limits

Enforced in TEE

Quantum attacks

Post-quantum algorithms

NIST-standardized

Operator access

Session mode (no persistence)

Auditable

Side-channels

Constant-time crypto, blinding

Reference impl.

4.3 Attestation

Remote Attestation Workflow:

Attestation Report Contains:

  • MRENCLAVE: Hash of code + data loaded in TEE

  • MRSIGNER: Public key of code signer

  • ISV_PROD_ID: Product identifier

  • ISV_SVN: Security version number

  • Report Data: Custom data (e.g., service public key)

Reproducible Builds: Clients can rebuild Docker image and verify hash matches attestation.

4.4 Compliance

Current:

  • ✅ NIST PQC standards (FIPS 203, 204)

  • ✅ TEE-based isolation (comparable to FIPS 140-2 Level 2)

  • ✅ Audit logging

  • ✅ SOC 2 Type II path (Secret Network platform)

Phase 2 (CloudHSM):

  • ✅ FIPS 140-2 Level 3 certification

  • ✅ PCI-DSS compliance

  • ✅ HIPAA technical safeguards

  • ✅ FedRAMP eligible

Last updated