Identity at every boundary.
Every service, every request, every operator action carries a verifiable identity. Default deny. Nothing trusts location alone.
Security
Compliance lives in the architecture, from the first line of code. Zero-trust by default. Encrypted in flight and at rest. Supply chain receipts that hold up under scrutiny.
Principles
Every service, every request, every operator action carries a verifiable identity. Default deny. Nothing trusts location alone.
Permissions scope to the smallest set that lets the work happen. Standing access becomes time-bound elevation. Service accounts get exactly one job.
AES-256 at rest. TLS 1.3 in flight. Customer-managed keys when the threat model demands it. Encryption is a defaulted choice, not a checkbox at the end.
Every privileged action lands in an append-only log. Logs are signed, immutable for the retention window, then purged on schedule. The audit trail outlasts the engineer who wrote the change.
Vaulted, scoped, and rotated. Rotation is automated where the secret allows it. Compromise triggers rotation in minutes. Secrets never live in env files, code, chat, or screenshots.
Compliance posture by domain
The lab works in regulated environments. Compliance shapes the architecture before the first line of code, not after the first external audit.
Healthcare
PHI handled with BAA-aware infrastructure choices. Access scoped by role. Audit trails for every PHI read and write. Encryption defaults that survive a forensic review. Patterns built to pass the Security Rule on the merits.
Finance
Separation of duties at the code level. Immutable audit logs for material transactions. Tokenization and encryption for cardholder data. Patterns that hold up under external audit because they were built that way from the first commit.
Defense / Gov
FIPS 140-3 validated cryptography. STIG-hardened baselines. Continuous monitoring patterns aligned with FedRAMP Moderate and High. Authority to operate is an engineering outcome earned through the build.
Across domains
Access controls, change management, incident response, vendor risk. Mapped to the controls auditors actually test, regardless of which framework the engagement is built against.
Supply chain integrity
The agency loop now writes code that pulls dependencies. Every coding agent shares roughly the same training cache: the same popular packages, the same install bases, the same blast radius. A single compromised module becomes a coordinated launching pad. The lab treats supply chain as a first-class engineering surface.
Every package that enters a client codebase carries a recorded posture: vetted-frozen, trusted-for-now, or rejected. Decisions live alongside their rationale in version control, not in someone's head.
Harder-to-forge evidence comes first: maintainer tenure, organizational affiliation, commit signing, publication metadata, install-base context. CVE lookups are the floor of the analysis, never the ceiling.
Every engagement ships with a software bill of materials. CycloneDX format. Versioned with the release. Signed. Delivered alongside the build, not assembled after a question lands.
Commits, releases, container images. cosign or sigstore on the way out. The signature travels with the artifact and is part of the deliverable. Verification is a one-line operation downstream.
When a package or maintainer identity is compromised, we burn it. The decision is recorded in the lab's ledger, the lockfile is patched, and every downstream engagement picks up the same posture without anyone asking twice.
Engineering practices
01
AI coding agents run inside Podman rootless containers within Incus boundaries. No agent has direct access to the host, the host's secrets, or anything outside the engagement workspace.
02
Every change is reviewed by a human engineer before it lands on main. Branch protection enforced. CI signs the artifact; the developer's laptop does not.
03
Non-trivial changes start with a versioned spec in git. The spec is the source of truth. The implementation is the proof. Both are reviewable, both are auditable.
04
Production credentials, API keys, and service tokens issued for an engagement are revoked the day the engagement ends. The lab keeps nothing past the handoff.
What the lab won't touch
The lab keeps a deliberate set of exclusions. They are easier to state than they are to hold to. We hold to them.
Disclosure
Security disclosures land with the engineers, not a ticketing queue. Send the report to the address below and we'll take it from there.
security@standardapplied.comAcknowledge
Within 24 hours
Triage
Five business days
Credit
In the changelog, on request