What is active
HSM-backed key management
The following controls were verified in the live production environment:- EKS secrets envelope encryption uses a customer-managed AWS KMS key (
arn:aws:kms:us-west-2:REDACTED:key/...). - The KMS key is backed by FIPS 140-2 Level 3 validated HSMs operated by AWS.
- SOPS-encrypted secrets at rest in the repository also use AWS KMS for envelope encryption.
- EBS volumes attached to the production cluster use
encrypted: "true"with thegp3storage class, with encryption keys managed by KMS.
TLS 1.3 enforcement
The following controls were verified in the live production environment:apigw.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.livekit.mka1.com:443negotiatedTLSv1.3with cipher suiteTLS_AES_128_GCM_SHA256.- Both endpoints use X25519 key exchange (253 bits) and RSA 2048-bit server public keys issued by AWS Certificate Manager.
- The ALB SSL policy
ELBSecurityPolicy-TLS13-1-2-2021-06is configured on the Kong and LiveKit ingresses, ensuring TLS 1.3 and strong TLS 1.2 ciphers only. - The production CNPG/PostgreSQL cluster enforces
ssl_min_protocol_version: TLSv1.3andssl_max_protocol_version: TLSv1.3. - Database TLS certificates are managed by cert-manager with dedicated
clientCASecret,serverCASecret,serverTLSSecret, andreplicationTLSSecretsecrets.
How we validate it
We validate HSM-backed key usage and TLS 1.3 enforcement with live cluster inspection and direct endpoint testing. KMS key and HSM backing are confirmed via the EKS cluster description:openssl s_client: