Hash-Chain Tamper-Proof Audit
Every audit event is cryptographically chained. Tampering with a single record breaks the entire chain, making unauthorized modifications instantly detectable.
Every layer of CtrlLayer is designed with security as the foundation, not an afterthought. Here's how we protect your organization.
Eight layers of security built into every component of the platform.
Every audit event is cryptographically chained. Tampering with a single record breaks the entire chain, making unauthorized modifications instantly detectable.
All sensitive data is encrypted using AES-256-GCM. Policy caches on endpoints are encrypted with device-bound keys rotated on schedule.
Every elevation grant is a signed JWT token with expiry, scope, device binding, and user identity. No unsigned grants ever reach an endpoint.
Role-based access control for coarse permissions, attribute-based access control for fine-grained policy targeting. Deny by default.
Four-tier rate limiting on auth (10/5min), agent (60/min), security (30/min), and tenant endpoints. Automatic lockout on abuse detection.
All outbound requests from the API are validated against an allowlist. Internal network addresses are blocked at the request layer.
Origin header validation on all state-changing requests. SameSite cookies and double-submit token patterns for defense in depth.
Startup validation ensures all secrets are set and non-default in production. The API refuses to start with development credentials in production mode.
Continuous posture assessment against your security baselines.
| ID | Check | Description | Status |
|---|---|---|---|
| CC-001 | Antivirus Status | Verify real-time protection is active | PASS |
| CC-002 | Firewall Enabled | Windows Firewall must be active on all profiles | PASS |
| CC-003 | Disk Encryption | BitLocker or equivalent must be enabled | PASS |
| CC-004 | OS Patch Level | System must be within N days of latest patches | PASS |
| CC-005 | Password Policy | Minimum complexity and rotation requirements | PASS |
| CC-006 | USB Storage Control | Removable media policy must be enforced | PASS |
| CC-007 | Screen Lock Timeout | Automatic lock after configurable idle period | PASS |
| CC-008 | Admin Account Audit | No unauthorized local admin accounts | PASS |
| CC-009 | Agent Health | CtrlLayer agent must be running and reporting | PASS |
| CC-010 | Software Allowlist | No unauthorized software installed | PASS |
Every device receives a real-time A-F security grade based on posture assessment.