MKA1 manages all cryptographic keys through AWS KMS, which is backed by FIPS 140-2 Level 3 validated hardware security modules. TLS 1.3 is enforced on every public endpoint and on internal database connections, with verified key sizes that meet compliance requirements.Documentation Index
Fetch the complete documentation index at: https://docs.mka1.com/llms.txt
Use this file to discover all available pages before exploring further.
What is active
HSM-backed key management
The following controls were verified in the live production environment:- EKS secrets envelope encryption uses a customer-managed AWS KMS key (
arn:aws:kms:us-west-2:REDACTED:key/...). - The KMS key is backed by FIPS 140-2 Level 3 validated HSMs operated by AWS.
- SOPS-encrypted secrets at rest in the repository also use AWS KMS for envelope encryption.
- EBS volumes attached to the production cluster use
encrypted: "true"with thegp3storage class, with encryption keys managed by KMS.
TLS 1.3 enforcement
The following controls were verified in the live production environment:apigw.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.livekit.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.- Both endpoints use X25519 key exchange (253 bits) and RSA 2048-bit server public keys issued by AWS Certificate Manager.
- The ALB SSL policy
ELBSecurityPolicy-TLS13-1-2-2021-06is configured on the Kong and LiveKit ingresses, ensuring TLS 1.3 and strong TLS 1.2 ciphers only. - The production CNPG/PostgreSQL cluster enforces
ssl_min_protocol_version: TLSv1.3andssl_max_protocol_version: TLSv1.3. - Database TLS certificates are managed by cert-manager with dedicated
clientCASecret,serverCASecret,serverTLSSecret, andreplicationTLSSecretsecrets.
How we validate it
We validate HSM-backed key usage and TLS 1.3 enforcement with live cluster inspection and direct endpoint testing. KMS key and HSM backing are confirmed via the EKS cluster description:openssl s_client: