Security

Governance is security.

We build local-first systems with clear authority boundaries, constrained execution, and audit-ready operation. Security isn’t a single feature — it’s a continuous design discipline.

Principles

Security posture

Our approach assumes real threats, imperfect networks, and operational pressure. The objective is to reduce unnecessary exposure while keeping systems usable and maintainable.

Least privilege by default

Access should be constrained to the minimum required for the role. Privileged actions are explicit, traceable, and — where appropriate — require step-up authentication.

Auditability as a feature

Security events should be reviewable: authentication attempts, configuration changes, access decisions, and operational actions. Logs should support real troubleshooting and real accountability.

Intentional connectivity

If remote access exists, it should be deliberate: authenticated, monitored, and limited. Systems should remain safe when offline rather than failing open.

Update integrity

Updates must be validated. Safe rollouts require staging, rollback plans, and integrity checks. Operational stability matters more than frequent change.

Data minimization

Minimize data movement. Sensitive information should remain local whenever possible, and retention should be policy-driven rather than accidental.

Defense in depth

No single control is perfect. Practical security uses layers: network boundaries, authentication, process isolation, monitoring, and operational discipline.

Operational clarity

Security that supports operations

Security is only effective if it works under operational pressure. Our aim is a posture that remains enforceable without breaking usability.

Clear authorityWho can do what — and under what conditions — is explicit.
Reviewable actionsChanges are logged and explainable.
Controlled recoveryDegraded modes and recovery pathways are planned.