Law/context/08_security_model.md
2026-02-23 15:20:00 +03:00

1.5 KiB

Security Model Context

Public

  • OTP verification required for request creation and request access
  • JWT in httpOnly cookie (7 days)
  • Rate limiting
  • Protection from brute force

Admin

  • JWT bearer
  • RBAC
  • Audit log required

Data Protection

  • Messages and attachments from previous statuses are immutable after status change
  • All actions logged

S3 & Personal Data (planned hardening)

  • Files in S3 are treated as personal data (PII/ПДн)
  • Security baseline for implementation:
  • Access model:
  • strict RBAC/least-privilege for object read/write
  • scoped object keys and server-side authorization checks on every download
  • no direct anonymous public bucket/object access
  • Cryptography:
  • encryption in transit (TLS) for all client<->API and API<->S3 paths
  • encryption at rest for object storage and backups
  • key rotation policy and secret management (no static secrets in code)
  • Audit & accountability:
  • immutable security audit trail for file operations (who, when, what object, action, result)
  • alerting on suspicious access patterns (mass download, repeated denied attempts)
  • periodic access review reports
  • Data lifecycle:
  • retention rules by data category/status
  • controlled deletion and archival procedures
  • backup restore testing and disaster recovery runbook
  • Compliance posture:
  • map controls to РФ requirements for personal data protection and internal cyber policies
  • formalize security checklist for release gates (threat review + access review + logging verification)