Runtime threat model
The Intended threat model addresses token theft, replay attacks, policy bypass, adapter impersonation, tenant boundary violations, and audit chain tampering. Each vector has a documented mitigation.
Enterprise / Security
Intended's security model is built on the principle that the authority system must be at least as secure as the systems it protects. Encryption, key isolation, fail-closed architecture, and tenant separation at every layer.
Data at rest
All sensitive data including signing keys, connector credentials, LIM provider keys, and encrypted prompts.
Data in transit
Enforced for all API communication, database connections, and cache connections.
Token signing
Per-tenant key pairs. Private keys encrypted with AES-256-GCM using server-side secret.
Evidence bundles
Self-contained evidence packages independently verifiable without database access.
Key isolation
Each tenant has unique RSA key pairs. Compromise of one tenant's keys does not affect others.
Key rotation
Keys transition through ACTIVE → PREVIOUS → RETIRED states with retry logic for race conditions.
Storage encryption
Private keys encrypted at the application level before database storage.
RBAC
Viewer, Operator, Approver, Admin. Enforced at Fastify middleware level on every request.
Tenant isolation
Every query scoped to tenant ID. No API surface for cross-tenant access.
API authentication
API keys with mrt_live_ (production) and mrt_test_ (development) prefixes.
SSO / SAML
OIDC/SAML runtime flows and SCIM provisioning with tenant-bound enforcement.
Fail-closed
If the Authority Engine cannot reach a decision, the intent is denied. No fallback bypasses authority.
Nonce protection
Every token nonce is consumed on first verification. Replay attacks are impossible.
Audit integrity
Tamper-evident chain. Any modification breaks the chain and is immediately detectable.
The Intended threat model addresses token theft, replay attacks, policy bypass, adapter impersonation, tenant boundary violations, and audit chain tampering. Each vector has a documented mitigation.
Security vulnerabilities can be reported to security@intended.so under a coordinated disclosure policy. We commit to acknowledgment within 48 hours and resolution timeline within 5 business days.
Annual third-party penetration testing is part of the compliance roadmap. Results are shared with enterprise customers under NDA upon request.
A current list of subprocessors and their roles in the Intended platform is maintained and available to enterprise customers upon request.