911 B
911 B
Security Requirements
Authentication
- All authentication must use TLS 1.3 with modern ciphers (AES256-GCM, CHACHA20)
- Client certificate pinning required (SHA-256 fingerprints)
- Signed OU claims for role mapping (HMAC-SHA256)
Authorization
- Role-Based Access Control (RBAC) with:
- Role inheritance hierarchy
- Permission composition
- Boundary enforcement (GLOBAL, INTERNAL, RESTRICTED)
- Least privilege principle enforced
- All privileged operations require ADMIN role
Data Protection
- AES-256 encryption for all secrets
- Audit logs with integrity protection (HMAC-SHA256)
- 90-day audit log retention
New Requirements for Role Inheritance
- Roles can inherit permissions from parent roles
- Inheritance must respect boundary restrictions
- Circular inheritance must be prevented
- Admin role inherits all permissions
- Developer role inherits basic permissions