Expand description
π krypto
kong
cryptography and security
Security Features
- No Complexity
- Small code surface
TODO
- Prevention (eg vault)
- Detection (eg alarms)
- Reaction (eg police)
- π‘οΈ Physical Security
- Machine Identity
- Secure Boot Stack
- π Secure Service Deployment
- π« Service Identity, Integrity, and Isolation
- π Inter-Service Access Management
- π π Encryption of Inter-Service Communication
- πͺ Access Management of End User Data
- π¨ Intrusion Detection
- π‘ Denial of Service (DoS) Protection
- ππ Secure Data Storage
- Encryption at Rest
- Deletion of data
- Encryption at Rest
Modules
π Authentication
Default values
Krypto errors
πͺͺ Kong Passport
π Password management