๐Ÿ“Œ Cryptographic Workload Identity

Control Core provides enterprise-grade cryptographic workload identity for internal communications between platform components. This advanced security capability enables zero-trust architecture, mutual authentication, and compliance with rigorous security frameworks.

๐Ÿ“Œ Overview

Traditional network-based security relies on perimeter defenses and network location. Control Core's cryptographic workload identity goes further by providing:

  • Strong cryptographic attestation of every service component
  • Short-lived, automatically rotated certificates (X.509-based)
  • Mutual TLS (mTLS) for all internal communications
  • Hardware and software-backed identity verification

Every Control Core Bouncer and Control Plane component cryptographically proves its identity before participating in the authorization infrastructure.

๐Ÿ”’ Security Benefits

Zero-Trust Architecture

Control Core implements zero-trust principles at the infrastructure level:

Traditional SecurityControl Core Zero-Trust
Trust based on network locationTrust based on cryptographic identity
Static credentialsShort-lived, auto-rotated certificates
Perimeter-focusedIdentity-verified at every request
Implicit trust within networkExplicit verification required

Defense in Depth

Cryptographic workload identity adds a critical security layer:

  1. Workload Attestation: Components prove their identity through cryptographic challenges
  2. Mutual Authentication: Both Control Plane and Bouncers verify each other
  3. Encrypted Communications: All internal traffic uses mTLS
  4. Identity-Based Policies: Authorization decisions can include workload identity

๐Ÿ”’ Compliance and Regulatory Alignment

Control Core's cryptographic workload identity helps organizations meet requirements from multiple security frameworks and regulations:

SOC 2 Type II

  • CC6.1 (Logical Access Controls): Cryptographic identity ensures only authenticated workloads access resources
  • CC6.6 (Secure System Boundaries): mTLS encrypts all inter-component communication
  • CC6.7 (Data Transmission Security): Short-lived certificates with automatic rotation

ISO 27001

  • A.9.4 (System Access Control): Strong authentication for all system components
  • A.13.1 (Network Security): Encrypted internal communications
  • A.13.2 (Information Transfer): Cryptographic protection of data in transit

PCI DSS 4.0

  • Requirement 4 (Protect Cardholder Data): mTLS encryption for internal transmissions
  • Requirement 8 (Identify Users): Unique cryptographic identity per component
  • Requirement 11 (Test Security): Verifiable attestation mechanisms

HIPAA

  • ยง164.312(a)(1): Access controls via cryptographic workload identity
  • ยง164.312(e)(1): Transmission security through mTLS
  • ยง164.312(c)(1): Integrity controls via signed certificates

NIST 800-53

  • IA-3 (Device Identification): Cryptographic device/workload authentication
  • IA-5 (Authenticator Management): Automated certificate lifecycle
  • SC-8 (Transmission Confidentiality): mTLS for all internal traffic
  • SC-23 (Session Authenticity): Cryptographically verified sessions

FedRAMP

  • AC-17 (Remote Access): Strong authentication for distributed components
  • IA-2 (Identification and Authentication): Multi-factor authentication at workload level
  • SC-8 (Transmission Confidentiality): FIPS-validated cryptographic protection

๐Ÿ“Œ How It Works

Identity Lifecycle

When workload identity is enabled, components prove their identity and communicate over mTLS.

Click to enlarge

Phases:

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  Control Plane  โ”‚     โ”‚  Identity       โ”‚     โ”‚    Bouncer      โ”‚
โ”‚  (Identity      โ”‚โ—„โ”€โ”€โ”€โ–บโ”‚  Attestation    โ”‚โ—„โ”€โ”€โ”€โ–บโ”‚  (Identity      โ”‚
โ”‚   Authority)    โ”‚     โ”‚  Protocol       โ”‚     โ”‚   Verified)     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
        โ”‚                       โ”‚                       โ”‚
        โ–ผ                       โ–ผ                       โ–ผ
   Issue Certificates     Verify Claims           Obtain Identity
   (Short-Lived)          (Cryptographic)         (Auto-Renewed)
  1. Bootstrapping: Bouncers authenticate to Control Plane using secure attestation
  2. Identity Issuance: Control Plane issues short-lived X.509 certificates
  3. Mutual Verification: All subsequent communications verify both parties
  4. Automatic Renewal: Certificates rotate automatically before expiration

Certificate Properties

PropertyValue
FormatX.509 with workload identity extension
Key Size2048-bit RSA or P-256 ECDSA
ValidityShort-lived (minutes to hours)
RotationAutomatic, before expiration
RevocationSupported via trust bundle updates

๐Ÿ“Œ Using Workload Identity in Policies

When cryptographic workload identity is enabled, policies can authorize based on the verified workload identity:

package controlcore.secure_api

import rego.v1

default allow := false

# Require verified workload identity for sensitive endpoints
allow if {
  startswith(input.resource.path, "/api/admin")
  workload_identity_verified
  trusted_bouncer
}

# Check for cryptographic workload identity
workload_identity_verified if {
  input.workload.spiffe_id
  startswith(input.workload.spiffe_id, "spiffe://")
}

# Verify bouncer is from trusted domain
trusted_bouncer if {
  contains(input.workload.spiffe_id, "/bouncer/")
}

Available Identity Attributes

AttributeDescription
input.workload.spiffe_idFull cryptographic identity URI
Trust domainOrganizational boundary in identity
Workload typeService classification (e.g., bouncer)
Instance IDUnique workload instance identifier

๐Ÿ”’ Security Audit Evidence

Control Core's cryptographic workload identity provides auditors with:

Attestation Records

  • Complete audit trail of workload identity issuance
  • Timestamp and duration of each certificate
  • Attestation method and verification results

Cryptographic Proof

  • Non-repudiable evidence of component authentication
  • Certificate chain validation logs
  • mTLS handshake records

Compliance Reports

  • Identity lifecycle events
  • Certificate rotation history
  • Failed authentication attempts

๐Ÿ—๏ธ Architecture Overview

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                      Control Core Platform                       โ”‚
โ”‚                                                                  โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚
โ”‚  โ”‚    Control Plane     โ”‚     โ”‚         Bouncer(s)           โ”‚  โ”‚
โ”‚  โ”‚                      โ”‚     โ”‚                              โ”‚  โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚     โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚  โ”‚
โ”‚  โ”‚  โ”‚ Identity       โ”‚  โ”‚ mTLSโ”‚  โ”‚ Identity Agent         โ”‚  โ”‚  โ”‚
โ”‚  โ”‚  โ”‚ Authority      โ”‚โ—„โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ–บโ”‚ (Workload Attestation) โ”‚  โ”‚  โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚     โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚  โ”‚
โ”‚  โ”‚         โ”‚            โ”‚     โ”‚            โ”‚                 โ”‚  โ”‚
โ”‚  โ”‚         โ–ผ            โ”‚     โ”‚            โ–ผ                 โ”‚  โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚     โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚  โ”‚
โ”‚  โ”‚  โ”‚ Policy Admin   โ”‚  โ”‚     โ”‚  โ”‚ Policy Enforcement     โ”‚  โ”‚  โ”‚
โ”‚  โ”‚  โ”‚ (Identity     โ”‚โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”‚ (Bouncer)              โ”‚  โ”‚  โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚     โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚  โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚
โ”‚                                                                  โ”‚
โ”‚  All internal communications protected by mTLS with verified     โ”‚
โ”‚  cryptographic workload identity                                 โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿ“Œ Enabling Cryptographic Workload Identity

To enable this capability in your Control Core deployment, see the Work ID Configuration.

๐Ÿ“Œ Frequently Asked Questions

Q: Does this add latency to requests? A: Certificate caching and efficient protocols minimize overhead. Identity verification adds less than 1ms to most requests.

Q: What happens if the Control Plane is unavailable? A: Bouncers cache valid certificates. Authorization continues with cached policies until certificates approach expiration.

Q: Can I use my existing PKI? A: Control Core's identity system can integrate with external certificate authorities. Contact support for custom PKI integration.

Q: Is this required for all deployments? A: No. Cryptographic workload identity is an optional, advanced feature. Control Core works without it using traditional TLS.

๐Ÿ› ๏ธ Troubleshooting

IssueWhat to check
Certificate or trust errorsEnsure certificates are valid and the trust chain is configured.
Check rotation and expiry.
mTLS handshake failuresVerify client and server present valid certs.
Confirm CA and SANs match expectations.
Policy not receiving identity attributesConfirm workload identity is enabled.
Ensure the bouncer/Control Plane sends identity in the request context.

For more, see the Troubleshooting Guide and Work ID Configuration.