Three core principles
- Identity-first — every process has a unique cryptographic SPIFFE identity, so authorization decisions are always based on verified identity, never assumed context
- Zero standing access — credentials are short-lived (15-60 minutes) and scoped to the minimum required — no long-lived keys, no shared secrets
- Defense-in-depth — multiple independent layers mean no single misconfiguration or compromised component puts everything at risk
Six security layers
Layer 1: Cryptographic identity
Layer 1: Cryptographic identity
SPIFFE/SPIRE — Every agent process gets a unique X.509 SVID issued by SPIRE. This is per-process identity, not just per-pod, so individual sub-agents within a multi-agent framework each have their own cryptographic proof of identity.
Layer 2: Encrypted transport
Layer 2: Encrypted transport
Envoy mTLS — All traffic between your agents and platform services uses mutual TLS, with certificates sourced directly from SPIRE. Your agent code never manages certificates — Envoy handles the entire TLS lifecycle.
Layer 3: Per-process authorization
Layer 3: Per-process authorization
Layer 4: Short-lived cloud credentials
Layer 4: Short-lived cloud credentials
Credential Injector — Cloud credentials are issued with 15-60 minute TTLs, scoped to the requesting process’s identity, and cached in a three-tier system. No long-lived keys exist anywhere in your deployment.
Layer 5: GenAI threat scanning
Layer 5: GenAI threat scanning
LLM Guard — Prompts and LLM outputs are scanned for injection attempts, PII leakage, hardcoded secrets, and invisible text attacks before reaching your agent’s logic or leaving your system.
Layer 6: Compute isolation
Layer 6: Compute isolation
Firecracker sandbox — Code generated or executed by your agents runs inside Firecracker microVMs with hardware-level isolation, no network access, and resource limits. Kubernetes namespaces provide tenant-level isolation — your workloads never share infrastructure with other tenants.
What each layer protects you from
| Layer | Threat | How Hexr protects you |
|---|---|---|
| SPIFFE identity | Impersonation, unauthorized access | Cryptographic proof of identity — no assumed trust |
| mTLS | Eavesdropping, man-in-the-middle attacks | All traffic encrypted with X.509 certificates |
| OPA policies | Overprivileged agents, unauthorized tool access | Per-process, per-service authorization on every call |
| Credential Injector | Credential leakage, long-lived key exposure | 15-minute tokens, auto-rotated, never stored in code |
| LLM Guard | Prompt injection, PII leakage in outputs | Multi-scanner pipeline on every prompt and response |
| Firecracker sandbox | Code execution escape | Hardware-level microVM isolation |
| Namespaces | Cross-tenant data access | Kubernetes namespace isolation per tenant |
Compliance readiness
| Framework | Status |
|---|---|
| OWASP Top 10 for GenAI | All 10 risks addressed |
| SOC 2 Type II | Architecture designed for compliance |
| NIST AI RMF | Identity and risk controls aligned |
| GDPR | PII scanning, data isolation per tenant |
| HIPAA | Encryption at rest and in transit |
Explore the security model in depth
SPIFFE identity
How per-process cryptographic identity works and what it gives you.
OPA policies
Write and deploy Rego authorization policies for your agents.
Threat model
Agent-specific attack chains and how each one is mitigated.
Compliance frameworks
SOC 2, NIST, GDPR, and HIPAA control mappings.