ECHOproject.ai
Awareness Engineered

Security Doctrine

Tight by design. We assume breach, contain blast radius, and prove readiness with drills. Privacy isn’t a feature — it’s the contract.

First Principles

  • Assume breach. Design so a single fault can’t cascade.
  • Minimize & isolate. Least data, least privilege, smallest blast radius.
  • Sovereignty. On‑prem / off‑grid options; data residency respected.
  • No surveillance economics. Consent‑driven data only.
  • Measured, not vibes. Controls tied to tests and audits.

Data Sovereignty & Isolation

  • Per‑tenant stores; no cross‑mixing — ever.
  • Encryption in transit & at rest; customer‑managed keys optional.
  • Retention controls with export & delete SLAs.
  • Regional residency and geo‑fencing on request.

Access Control & Identity

  • Least‑privilege IAM; just‑in‑time access; time‑boxed elevation.
  • Hardware‑bound keys and enforced MFA; no shared accounts.
  • Comprehensive session logging with tamper‑evident trails.

Secure Build & Supply Chain

  • Reproducible builds, signed artifacts, SBOM for each release.
  • Dependency pinning, provenance checks, and staged rollouts.
  • Policy‑as‑code gates in CI/CD; mandatory reviews & branch protection.

Runtime Safeguards

  • Zero‑trust networking; micro‑segmented services; egress allow‑lists.
  • Secrets vaulted; rotation enforced; access short‑lived by default.
  • Automatic containment: rate limits, circuit breakers, sandboxing.

Governance & Audit

  • Independent audits and red‑team exercises.
  • Compliance mapping (e.g., SOC 2 / ISO 27001) — we align practices to required controls without marketing fluff.
  • Customer‑visible controls: logs, configs, and change windows.

Incident Response & Drills

  • 24/7 on‑call with defined RTO/RPO targets.
  • Tabletop and live‑fire exercises; kill‑switch drills quarterly.
  • Post‑incident reviews with corrective actions and timelines.

Customer Controls

  • One‑click pause/kill for nodes; scoped access tokens; IP allow‑lists.
  • Fine‑grained retention policies; export & purge on demand.
  • On‑prem/off‑grid deployment for maximal control.

Up to the Task

Security isn’t a promise — it’s a posture. We build for failure, prove readiness in drills, and earn trust with transparent, auditable controls.