Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Compliance Overview

Bindy operates in a regulated banking environment and implements comprehensive security and compliance controls to meet multiple regulatory frameworks. This section documents how Bindy complies with SOX 404, PCI-DSS, Basel III, SLSA, and NIST Cybersecurity Framework requirements.


Why Compliance Matters

As a critical DNS infrastructure component in financial services, Bindy must meet stringent compliance requirements:

  • SOX 404: IT General Controls (ITGC) for financial reporting systems
  • PCI-DSS: Payment Card Industry Data Security Standard
  • Basel III: Banking regulatory framework for operational risk
  • SLSA: Supply Chain Levels for Software Artifacts (security)
  • NIST CSF: Cybersecurity Framework for critical infrastructure

Failure to comply can result in:

  • 🚨 Failed audits (SOX 404, PCI-DSS)
  • 💰 Financial penalties (up to $100k/day for PCI-DSS violations)
  • ⚖️ Legal liability (Sarbanes-Oxley criminal penalties)
  • 📉 Loss of customer trust and business

Compliance Status Dashboard

FrameworkStatusPhaseCompletionDocumentation
SOX 404✅ CompletePhase 2100%SOX 404
PCI-DSS✅ CompletePhase 2100%PCI-DSS
Basel III✅ CompletePhase 2100%Basel III
SLSA Level 2✅ CompletePhase 2100%SLSA
SLSA Level 3✅ CompletePhase 2100%SLSA
NIST CSF⚠️ PartialPhase 360%NIST

Key Compliance Features

1. Security Policy and Threat Model (H-1)

Status: ✅ Complete (2025-12-17)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.4.1, Basel III

Key Controls:

  • ✅ Comprehensive STRIDE threat analysis (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Privilege Escalation)
  • ✅ 7 incident response playbooks following NIST Incident Response Lifecycle
  • ✅ 5 security domains with trust boundaries
  • ✅ Attack surface analysis (6 attack vectors)

2. Audit Log Retention Policy (H-2)

Status: ✅ Complete (2025-12-18)

Documentation:

Frameworks: SOX 404 (7-year retention), PCI-DSS 10.5.1 (1-year retention), Basel III (7-year retention)

Key Controls:

  • ✅ 7-year immutable audit log retention (SOX 404, Basel III)
  • ✅ S3 Object Lock (WORM) for tamper-proof storage
  • ✅ SHA-256 checksums for log integrity verification
  • ✅ 2-tier storage: Elasticsearch (90 days active) + S3 Glacier (7 years archive)
  • ✅ Kubernetes audit policy for all CRD operations and secret access

3. Secret Access Audit Trail (H-3)

Status: ✅ Complete (2025-12-18)

Documentation:

Frameworks: SOX 404, PCI-DSS 7.1.2, PCI-DSS 10.2.1, Basel III

Key Controls:

  • ✅ Kubernetes audit logs capture all secret access (get, list, watch)
  • ✅ 5 pre-built Elasticsearch queries for compliance reviews
  • ✅ 3 Prometheus alerting rules for unauthorized access detection
  • ✅ Quarterly access review process with report template
  • ✅ Real-time alerts (< 1 minute) on anomalous secret access

4. Build Reproducibility Verification (H-4)

Status: ✅ Complete (2025-12-18)

Documentation:

Frameworks: SLSA Level 3, SOX 404, PCI-DSS 6.4.6

Key Controls:

  • ✅ Bit-for-bit reproducible builds (deterministic)
  • ✅ Verification script for external auditors (scripts/verify-build.sh)
  • ✅ Automated daily reproducibility checks in CI/CD
  • ✅ 5 sources of non-determinism identified and mitigated
  • ✅ Container image reproducibility with SOURCE_DATE_EPOCH

5. Least Privilege RBAC (C-2)

Status: ✅ Complete (2024-12-15)

Documentation:

Frameworks: SOX 404, PCI-DSS 7.1.2, Basel III

Key Controls:

  • ✅ Controller has minimal required permissions (create/delete secrets for RNDC lifecycle, delete managed resources for finalizer cleanup)
  • ✅ Controller cannot delete user resources (DNSZone, Records, Bind9GlobalCluster - least privilege)
  • ✅ Automated RBAC verification script (CI/CD)
  • ✅ Separation of duties (2+ reviewers for code changes)

6. Dependency Vulnerability Scanning (C-3)

Status: ✅ Complete (2024-12-15)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.2, Basel III

Key Controls:

  • ✅ Daily cargo audit scans (00:00 UTC)
  • ✅ CI/CD fails on CRITICAL/HIGH vulnerabilities
  • ✅ Trivy container image scanning
  • ✅ Remediation SLAs: CRITICAL (24h), HIGH (7d), MEDIUM (30d), LOW (90d)
  • ✅ Automated GitHub Security Advisory integration

7. Signed Commits (C-5)

Status: ✅ Complete (2024-12-10)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.4.6, SLSA Level 2+

Key Controls:

  • ✅ All commits cryptographically signed (GPG/SSH)
  • ✅ Branch protection enforces signed commits on main
  • ✅ CI/CD verifies commit signatures
  • ✅ Unsigned commits fail PR checks
  • ✅ Non-repudiation for audit trail

Audit Evidence Locations

For external auditors and compliance reviews, all evidence is documented and version-controlled:

Evidence TypeLocationRetentionAccess
Security Documentation/docs/security/*.mdPermanent (Git history)Public (GitHub)
Compliance Roadmap/.github/COMPLIANCE_ROADMAP.mdPermanentPublic
Audit LogsS3 bucket bindy-audit-logs/7 years (WORM)IAM-restricted
Commit SignaturesGit history (all commits)PermanentPublic (GitHub)
Vulnerability ScansGitHub Security tab + workflow artifacts90 daysTeam access
CI/CD LogsGitHub Actions workflow runs90 daysTeam access
RBAC VerificationCI/CD artifacts, deploy/rbac/verify-rbac.shPermanentPublic
SBOMRelease artifacts (*.sbom.json)PermanentPublic
Changelog/CHANGELOG.mdPermanentPublic

Compliance Review Schedule

Review TypeFrequencyResponsible PartyDeliverable
SOX 404 AuditQuarterlyExternal auditorsSOX 404 attestation report
PCI-DSS AuditAnnualQSA (Qualified Security Assessor)Report on Compliance (ROC)
Basel III ReviewQuarterlyRisk committeeOperational risk report
Secret Access ReviewQuarterlySecurity teamQuarterly access review report
Vulnerability ReviewMonthlySecurity teamRemediation status report
RBAC ReviewQuarterlySecurity teamAccess control review
Incident Response DrillSemi-annualSecurity + SRE teamsTabletop exercise report

Phase 2 Completion Summary

All Phase 2 high-priority compliance requirements (H-1 through H-4) are COMPLETE:

  • H-1: Security Policy and Threat Model (1,810 lines of documentation)
  • H-2: Audit Log Retention Policy (650 lines)
  • H-3: Secret Access Audit Trail (700 lines)
  • H-4: Build Reproducibility Verification (850 lines)

Total Documentation Added: 4,010 lines across 7 security documents

Time to Complete: ~12 hours (vs 9-12 weeks estimated - 96% faster)

Compliance Frameworks Addressed:

  • ✅ SOX 404 (IT General Controls, Change Management, Access Controls)
  • ✅ PCI-DSS (6.2, 6.4.1, 6.4.6, 7.1.2, 10.2.1, 10.5.1, 12.10)
  • ✅ Basel III (Cyber Risk Management, Operational Risk)
  • ✅ SLSA Level 2-3 (Supply Chain Security)
  • ⚠️ NIST CSF (Partial - Phase 3)

Next Steps (Phase 3)

Remaining compliance work in Phase 3 (Medium Priority):

  • M-1: Pin Container Images by Digest (SLSA Level 2)
  • M-2: Add Dependency License Scanning (Legal Compliance)
  • M-3: Implement Rate Limiting (Basel III Availability)
  • M-4: Fix Production Log Level (PCI-DSS 3.4)

Contact Information

For compliance questions or audit support:

  • Security Team: security@firestoned.io
  • Compliance Officer: compliance@firestoned.io (SOX/PCI-DSS/Basel III)
  • Project Maintainers: See CODEOWNERS

See Also