What is active
Encryption at rest
The following controls were verified in the live production environment:- EKS secrets envelope encryption is active on
mk1-eks-production. - The live EKS cluster reports
encryptionConfigfor resource typesecrets. - The live cluster reports a KMS provider key ARN:
arn:aws:kms:us-west-2:REDACTED:key/5d84bfa7-REDACTED. - The production
ebs-scstorage class uses theebs.csi.aws.comprovisioner withencrypted: "true"andtype: gp3.
infra-resources/mk1/resources/storage/ebs-storage-class.yamlsetsencrypted: "true"onebs-sc.infra-resources/helm/cnpg/kube/cluster-production.yamlusesstorageClass: ebs-scfor the production PostgreSQL cluster.
Encryption in transit
The following controls were verified in the live production environment:apigw.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.livekit.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.- Both public TLS checks completed with certificate verification
OK. - The public Kong ingress is configured with
alb.ingress.kubernetes.io/ssl-policy: ELBSecurityPolicy-TLS13-1-2-2021-06. - The live CNPG/PostgreSQL cluster reports
ssl_min_protocol_version: TLSv1.3andssl_max_protocol_version: TLSv1.3. - The live CNPG/PostgreSQL cluster reports active certificate material in
clientCASecret,serverCASecret,serverTLSSecret, andreplicationTLSSecret.
infra-resources/kong/resources/ingress-proxy.yamlsetsalb.ingress.kubernetes.io/ssl-policy: ELBSecurityPolicy-TLS13-1-2-2021-06.
How we validate it
We validate the deployed state with repo-owned scripts ininfra-resources and live cluster inspection.
tools/compliance/verify_storage_encryption.sh captures storage encryption evidence by running:
tools/compliance/verify_tls13.sh captures public TLS evidence by running openssl s_client with -tls1_3 against each public endpoint: