Security & Guardrails

Tapistry layers controls across build, runtime, and marketplace experiences so creators and consumers can trust the platform.

Key assets we protect

  • User-uploaded function code and container images.
  • Platform credentials: JWTs, platform keys, and third-party tool secrets (PMK, DMK, UBYOK).
  • Billing data, usage analytics, and audit logs.

Threat model highlights

  • Sandbox isolation: Functions run in non-root containers with read-only filesystems, resource limits, and seccomp profiles.
  • Network controls: Deny-by-default egress with hostname/path allowlists and audit logging for every external call.
  • Credential safety: Scoped credential injection via the egress proxy plus encrypted storage for long-lived secrets.
  • Supply chain defense: SBOM generation, vulnerability scanning, image signing, and SLSA attestations on every build.
  • RBAC and API keys: Scoped platform keys per environment, short-lived JWTs, and admin action auditing prevent privilege escalation.

Credential management modes

  • Platform-managed keys (PMK): Tapistry provisions subaccounts (e.g., Twilio, SendGrid) and injects credentials during egress so creators never handle secrets directly.
  • Developer-managed keys (DMK): Creators store their own vendor keys in the encrypted credential vault and accept ToS responsibility.
  • User-managed keys (UBYOK): End users connect personal accounts; APIs receive scoped tokens via the egress proxy at invocation time.

Need implementation detail? Read the Credential Management Modes guide for step-by-step configuration of PMK, DMK, and UBYOK flows.

Transport Security

  • External traffic terminates at the AWS ALB using TLS 1.3 with automatic HTTP→HTTPS redirects.
  • PostgreSQL and Redis connections require TLS (`sslmode=require`, `rediss://`) by default.
  • NATS messaging supports TLS endpoints with optional mutual authentication via `NATS_TLS_*` variables.
  • CloudWatch log groups and RDS storage are encrypted with customer-managed KMS keys.

Operational safeguards

  • Rate limiting and quotas at gateway, service, and tenant layers reduce DoS risk.
  • Monitoring fan-out through SNS, Slack, and PagerDuty keeps teams informed about anomalies.
  • Audit trails capture every credential access, marketplace promotion, and admin action.

Dig into the threat model and the secrets management guide for complete details.