๐ Cryptographic Workload Identity
Control Core provides enterprise-grade cryptographic workload identity for internal communications between platform components. This advanced security capability enables zero-trust architecture, mutual authentication, and compliance with rigorous security frameworks.
๐ Overview
Traditional network-based security relies on perimeter defenses and network location. Control Core's cryptographic workload identity goes further by providing:
- Strong cryptographic attestation of every service component
- Short-lived, automatically rotated certificates (X.509-based)
- Mutual TLS (mTLS) for all internal communications
- Hardware and software-backed identity verification
Every Control Core Bouncer and Control Plane component cryptographically proves its identity before participating in the authorization infrastructure.
๐ Security Benefits
Zero-Trust Architecture
Control Core implements zero-trust principles at the infrastructure level:
| Traditional Security | Control Core Zero-Trust |
|---|---|
| Trust based on network location | Trust based on cryptographic identity |
| Static credentials | Short-lived, auto-rotated certificates |
| Perimeter-focused | Identity-verified at every request |
| Implicit trust within network | Explicit verification required |
Defense in Depth
Cryptographic workload identity adds a critical security layer:
- Workload Attestation: Components prove their identity through cryptographic challenges
- Mutual Authentication: Both Control Plane and Bouncers verify each other
- Encrypted Communications: All internal traffic uses mTLS
- Identity-Based Policies: Authorization decisions can include workload identity
๐ Compliance and Regulatory Alignment
Control Core's cryptographic workload identity helps organizations meet requirements from multiple security frameworks and regulations:
SOC 2 Type II
- CC6.1 (Logical Access Controls): Cryptographic identity ensures only authenticated workloads access resources
- CC6.6 (Secure System Boundaries): mTLS encrypts all inter-component communication
- CC6.7 (Data Transmission Security): Short-lived certificates with automatic rotation
ISO 27001
- A.9.4 (System Access Control): Strong authentication for all system components
- A.13.1 (Network Security): Encrypted internal communications
- A.13.2 (Information Transfer): Cryptographic protection of data in transit
PCI DSS 4.0
- Requirement 4 (Protect Cardholder Data): mTLS encryption for internal transmissions
- Requirement 8 (Identify Users): Unique cryptographic identity per component
- Requirement 11 (Test Security): Verifiable attestation mechanisms
HIPAA
- ยง164.312(a)(1): Access controls via cryptographic workload identity
- ยง164.312(e)(1): Transmission security through mTLS
- ยง164.312(c)(1): Integrity controls via signed certificates
NIST 800-53
- IA-3 (Device Identification): Cryptographic device/workload authentication
- IA-5 (Authenticator Management): Automated certificate lifecycle
- SC-8 (Transmission Confidentiality): mTLS for all internal traffic
- SC-23 (Session Authenticity): Cryptographically verified sessions
FedRAMP
- AC-17 (Remote Access): Strong authentication for distributed components
- IA-2 (Identification and Authentication): Multi-factor authentication at workload level
- SC-8 (Transmission Confidentiality): FIPS-validated cryptographic protection
๐ How It Works
Identity Lifecycle
When workload identity is enabled, components prove their identity and communicate over mTLS.
Click to enlarge
Phases:
โโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโ
โ Control Plane โ โ Identity โ โ Bouncer โ
โ (Identity โโโโโโบโ Attestation โโโโโโบโ (Identity โ
โ Authority) โ โ Protocol โ โ Verified) โ
โโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโ
โ โ โ
โผ โผ โผ
Issue Certificates Verify Claims Obtain Identity
(Short-Lived) (Cryptographic) (Auto-Renewed)
- Bootstrapping: Bouncers authenticate to Control Plane using secure attestation
- Identity Issuance: Control Plane issues short-lived X.509 certificates
- Mutual Verification: All subsequent communications verify both parties
- Automatic Renewal: Certificates rotate automatically before expiration
Certificate Properties
| Property | Value |
|---|---|
| Format | X.509 with workload identity extension |
| Key Size | 2048-bit RSA or P-256 ECDSA |
| Validity | Short-lived (minutes to hours) |
| Rotation | Automatic, before expiration |
| Revocation | Supported via trust bundle updates |
๐ Using Workload Identity in Policies
When cryptographic workload identity is enabled, policies can authorize based on the verified workload identity:
package controlcore.secure_api
import rego.v1
default allow := false
# Require verified workload identity for sensitive endpoints
allow if {
startswith(input.resource.path, "/api/admin")
workload_identity_verified
trusted_bouncer
}
# Check for cryptographic workload identity
workload_identity_verified if {
input.workload.spiffe_id
startswith(input.workload.spiffe_id, "spiffe://")
}
# Verify bouncer is from trusted domain
trusted_bouncer if {
contains(input.workload.spiffe_id, "/bouncer/")
}
Available Identity Attributes
| Attribute | Description |
|---|---|
input.workload.spiffe_id | Full cryptographic identity URI |
| Trust domain | Organizational boundary in identity |
| Workload type | Service classification (e.g., bouncer) |
| Instance ID | Unique workload instance identifier |
๐ Security Audit Evidence
Control Core's cryptographic workload identity provides auditors with:
Attestation Records
- Complete audit trail of workload identity issuance
- Timestamp and duration of each certificate
- Attestation method and verification results
Cryptographic Proof
- Non-repudiable evidence of component authentication
- Certificate chain validation logs
- mTLS handshake records
Compliance Reports
- Identity lifecycle events
- Certificate rotation history
- Failed authentication attempts
๐๏ธ Architecture Overview
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Control Core Platform โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Control Plane โ โ Bouncer(s) โ โ
โ โ โ โ โ โ
โ โ โโโโโโโโโโโโโโโโโโ โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โ โ Identity โ โ mTLSโ โ Identity Agent โ โ โ
โ โ โ Authority โโโโผโโโโโโผโโบโ (Workload Attestation) โ โ โ
โ โ โโโโโโโโโโโโโโโโโโ โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โ โ โ โ โ โ โ
โ โ โผ โ โ โผ โ โ
โ โ โโโโโโโโโโโโโโโโโโ โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โ โ Policy Admin โ โ โ โ Policy Enforcement โ โ โ
โ โ โ (Identity โโโโผโโโโโโผโโโ (Bouncer) โ โ โ
โ โ โโโโโโโโโโโโโโโโโโ โ โ โโโโโโโโโโโโโโโโโโโโโโโโโโ โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ
โ All internal communications protected by mTLS with verified โ
โ cryptographic workload identity โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
๐ Enabling Cryptographic Workload Identity
To enable this capability in your Control Core deployment, see the Work ID Configuration.
๐ Frequently Asked Questions
Q: Does this add latency to requests? A: Certificate caching and efficient protocols minimize overhead. Identity verification adds less than 1ms to most requests.
Q: What happens if the Control Plane is unavailable? A: Bouncers cache valid certificates. Authorization continues with cached policies until certificates approach expiration.
Q: Can I use my existing PKI? A: Control Core's identity system can integrate with external certificate authorities. Contact support for custom PKI integration.
Q: Is this required for all deployments? A: No. Cryptographic workload identity is an optional, advanced feature. Control Core works without it using traditional TLS.
๐ ๏ธ Troubleshooting
| Issue | What to check |
|---|---|
| Certificate or trust errors | Ensure certificates are valid and the trust chain is configured. Check rotation and expiry. |
| mTLS handshake failures | Verify client and server present valid certs. Confirm CA and SANs match expectations. |
| Policy not receiving identity attributes | Confirm workload identity is enabled. Ensure the bouncer/Control Plane sends identity in the request context. |
For more, see the Troubleshooting Guide and Work ID Configuration.
๐ Related Documentation
- Security Best Practices - Overview of security features
- Work ID Configuration - Technical setup guide
- Rego Guidelines - Policy authoring with identity attributes
- Enterprise Architecture - Large-scale deployment patterns