Operations
Security
Identity, replay protection, policy signatures, and environment enforcement.
Security Model
Security in Bridge Kernel is layered and explicit.
Key generation and storage
- Ed25519 keypairs are generated per node.
- Software keys are stored in JSON keystore.
- Production can enforce TPM-backed key operations.
Key rotation
Each signature carries:
key_idkey_version
This keeps old and new signatures auditable after rotation.
DID format
Node identity uses:
did:joulebridge:<key-id>
Replay protection
Defaults:
- replay window:
600s - allowed future skew:
120s
Events outside policy are rejected before proof persistence.
Idempotency
Duplicate event_id values are ignored to prevent replay and accidental double-ingest.
Environment enforcement
For staging/production, enforce:
- TPM requirement
fail_closedsignature_secretfor policy workflows
Policy bundle signing
Bundles are signed with HMAC-SHA256 before stage/promote.
Hardening checklist
- Restrict keystore filesystem permissions.
- Rotate keys on schedule and after incident response.
- Protect policy signing secret in secret manager.
- Lock inbound sync channel permissions by peer identity.
- Audit bundle promotion and rollback events.