Перейти к основному содержимому

Security Model

Crawbl is designed for enterprises that require rigorous security controls. This page summarizes our security approach.

Security Principles

Zero Trust Architecture

Every component operates with zero trust:

PrincipleImplementation
Never trust, always verifyAll requests authenticated, all services verify each other
Least privilegeComponents have minimum permissions needed
Explicit verificationNo implicit trust based on network location
Assume breachSegmentation limits blast radius

Defense in Depth

Multiple security layers protect the platform:

Authentication and trust boundaries through the Crawbl platform
Click diagram to zoom

Secret Management

Zero Secrets in Git

All sensitive data is stored externally:

Secret TypeStorageAccess
API KeysManaged secrets serviceAutomated sync to runtime
OAuth TokensManaged secrets servicePer-user encrypted storage
Database CredentialsManaged secrets serviceKubernetes secrets injection
TLS CertificatesAutomated certificate managementAutomatic renewal

Secret Flow

Secret flow from managed secrets service into Kubernetes workloads
Click diagram to zoom

Secrets are:

  • Never committed to Git
  • Rotated automatically where possible
  • Scoped to specific workspaces
  • Audited for access

Network Security

Runtime Isolation

Agent runtimes have no direct internet access:

Network path into the orchestrator and isolation of user runtimes
Click diagram to zoom

All external communication goes through the orchestrator:

Traffic TypeAllowed?Mediated By
User → Orchestrator✅ YesIngress + Auth
Orchestrator → Agent runtime✅ YesMCP/Webhook
Agent runtime → Orchestrator✅ YesMCP callback
Agent runtime → Internet❌ NoN/A
Orchestrator → Internet✅ YesEgress controls

HMAC Authentication

Internal service-to-service communication uses HMAC:

  • Timestamp-based request signing
  • Configurable key rotation
  • Replay attack prevention
  • Audit trail for all requests

Authentication & Authorization

User Authentication

MethodUse Case
Identity provider JWTMobile app users
API tokensProgrammatic access
API KeysService integrations (planned)

Authorization Model

Workspace-scoped permissions:

Organization
└── Workspace
└── User Permissions
└── Resource Access

Users can only access resources within their workspace. Cross-workspace access requires explicit invitation.

Compliance Capabilities

Audit Trail

All actions are logged:

  • Request timestamp and source
  • User identity and workspace
  • Action type and parameters
  • Result status

Data Residency

Since you deploy Crawbl in your infrastructure:

  • Full control over data location
  • No data leaves your environment
  • Compliance with regional requirements (GDPR, etc.)

Security Certifications

The platform is designed to support:

  • SOC 2 Type II
  • HIPAA (with proper configuration)
  • GDPR
  • ISO 27001 (with proper configuration)

Deep Dive

For detailed technical documentation: