Docs/Security & Infrastructure/Compliance Readiness
Security

Security Controls & Compliance Readiness

A transparent overview of Lobstack's security controls, deployment architecture, and compliance posture. What's live today, what's designed, and what's on the roadmap.

💡

Honest by Default

This page distinguishes between controls that are live in production, controls that are designed and coded (infrastructure-as-code ready for deployment), and items on the roadmap. We believe transparency builds trust.

Deployment Models#

Every Lobstack agent runs on isolated, single-tenant infrastructure. We provision dedicated VPS instances via approved cloud providers.

Details
TodayWe provision isolated VPS infrastructure via Hetzner, DigitalOcean, and Vultr. Region-pinned, single-tenant. Each agent gets its own dedicated VM with dedicated CPU, RAM, and NVMe storage.
Region OptionsUS-East (Virginia), US-West (Oregon), EU-Central (Frankfurt), EU-North (Helsinki), Asia-Pacific (Singapore)
IsolationOne VM per agent. No shared compute, no container co-tenancy, no noisy neighbors.
RoadmapBring-your-own-cloud (BYOC) — deploy Lobstack agents into your AWS, Azure, or GCP VPC with your IAM policies. Timeline TBD.

For Enterprise Buyers

Today we provision and manage the infrastructure on your behalf via approved providers. We can pin region and guarantee single-tenant isolation. BYOC/VPC deployment is on our roadmap — contact us for timeline and early access.

Audit Logging#

Lobstack logs security-relevant events across multiple layers. Here's what's logged and where.

Log SourceWhat's LoggedStatus
Application Logs (Supabase)Agent provisioning, deployment events, health checks, API errors, user actionsLive
Agent Activity LogsAll agent conversations, tool invocations, workflow executions, skill usageLive
Provisioning EventsVM creation/deletion, cloud-init execution, bridge health checksLive
Kubernetes API AuditSecret access, pod CRUD, RBAC changes, exec/attach — 2-year retentionDesigned (IaC ready)
Vault AuditSecret reads/writes, encryptions, auth events — persistent storageDesigned (IaC ready)
Falco Runtime EventsShell access, privilege escalation, crypto mining, suspicious network — forwarded to SIEMDesigned (IaC ready)
Istio Access LogsAll HTTP requests with source, destination, status, latencyDesigned (IaC ready)

Secret Management#

Today#

🔐

Encrypted Storage

API keys and credentials are stored encrypted in Supabase PostgreSQL with row-level security per account.

🚀

Secure Delivery

Secrets are injected into agent VMs via cloud-init at provisioning time over encrypted channels.

🔒

TLS Everywhere

All API communication uses TLS 1.3. Agent bridge communicates over HTTPS and WSS.

🗑️

Lifecycle Management

Secrets are deleted when agents are destroyed. No orphaned credentials.

Designed (Infrastructure-as-Code Ready)#

🏛️

HashiCorp Vault HA

3-node Raft cluster with Kubernetes auth, Transit encryption engine (AES-256-GCM), and templated RBAC policies.

🔑

Per-Agent Isolation

Vault templated policies scoped to agent ID — each agent can only read its own secrets.

🔄

Automatic Key Rotation

Vault Transit engine with 90-day automatic key rotation and versioned keys.

📋

Full Audit Trail

Every Vault operation logged — reads, writes, encryptions, auth events — retained on persistent storage.

Sandbox & Tool Controls#

Agent isolation is a core design principle. Every agent runs in its own dedicated virtual machine — not a shared container, not a serverless function.

ControlImplementationStatus
VM-Level IsolationDedicated VPS per agent with own OS, filesystem, and networkLive
Skill Permission SystemUsers explicitly enable/disable skills per agent from the dashboardLive
Tool Allow-ListAgent bridge only executes tools that are enabled in the agent's skill configurationLive
Approval WorkflowsConfigurable approval gates before tool execution (e.g., before sending emails)Live
gVisor Kernel SandboxApplication-level kernel (runsc) preventing container escape and kernel exploitsDesigned (IaC ready)
Network PoliciesK8s NetworkPolicies blocking inter-agent traffic, restricting egress to AI APIs onlyDesigned (IaC ready)
Runtime MonitoringFalco eBPF-based rules detecting shells, crypto mining, privilege escalationDesigned (IaC ready)
Admission ControlOPA Gatekeeper enforcing non-root, resource limits, no privileged containersDesigned (IaC ready)

Encryption Controls#

Data at Rest#

🗄️

Database

Supabase PostgreSQL with encryption at rest enabled. Row-level security per account.

💾

VM Disks

Cloud provider disk encryption for all agent VM volumes.

🔐

Kubernetes Secrets (Designed)

AES-256-CBC via EncryptionConfiguration — all secrets encrypted before writing to etcd.

🔑

Vault Storage (Designed)

AES-256-GCM via Vault seal mechanism on Raft integrated storage.

Data in Transit#

🌐

External Traffic

TLS 1.3 for all web traffic and API communication.

🔒

Agent Communication

HTTPS and WSS (WebSocket Secure) between dashboard and agent bridge.

🏛️

Internal mTLS (Designed)

Istio service mesh with STRICT mutual TLS — all pod-to-pod traffic mutually authenticated.

SOC 2 Readiness#

Lobstack's infrastructure controls are mapped to the AICPA Trust Services Criteria (CC1–CC9) covering Security, Availability, Processing Integrity, Confidentiality, and Privacy. Controls are implemented as infrastructure-as-code and are ready for formal audit.

OPA Gatekeeper admission policies enforce organizational standards. All infrastructure defined as code with PR review workflow. Namespace isolation separates concerns.

Controls Status#

Security Controls — Current Status
✅ Live    Encryption at rest (database, VM disks)
✅ Live    Encryption in transit (TLS 1.3, WSS)
✅ Live    Dedicated VM isolation per agent
✅ Live    Skill permission system & tool allow-list
✅ Live    Application audit logging (Supabase)
✅ Live    Agent activity logging
✅ Live    Secret lifecycle management (provision/destroy)
✅ Live    Multi-cloud deployment (Hetzner, DO, Vultr)
✅ Live    Row-level security (per-account data isolation)

🔧 Ready   K8s secrets encryption (AES-256-CBC)         — IaC defined
🔧 Ready   HashiCorp Vault HA (Raft, Transit, RBAC)     — IaC defined
🔧 Ready   gVisor sandbox per agent                     — IaC defined
🔧 Ready   Istio mTLS service mesh                      — IaC defined
🔧 Ready   K8s & Vault audit logging (2-year retention) — IaC defined
🔧 Ready   Falco runtime monitoring (8 custom rules)    — IaC defined
🔧 Ready   OPA Gatekeeper admission control             — IaC defined
🔧 Ready   NetworkPolicies (zero inter-agent traffic)   — IaC defined

📋 Roadmap  Formal SOC 2 Type II audit
📋 Roadmap  Bring-your-own-cloud (BYOC) VPC deployment
📋 Roadmap  Customer-managed encryption keys (CMEK)

Full Controls Mapping

The complete SOC 2 controls mapping with infrastructure-as-code evidence is available at infra/docs/soc2-compliance.md in the Lobstack repository. Contact us for a detailed security review.