Security
Enterprise-grade security for procurement automation
Authentication
- -- Adaptive MFA with risk-based TOTP challenges
- -- Trusted-device recognition (90-day cookie)
- -- bcrypt password hashing (14 rounds)
- -- HMAC-signed session tokens
- -- CSRF double-submit protection
Infrastructure
- -- AWS VPC with private subnets (no public RDS/Redis)
- -- TLS everywhere (ALB + ElastiCache transit encryption)
- -- WAF with rate limiting on auth endpoints
- -- GuardDuty threat detection
- -- Secrets Manager for all credentials
Data protection
- -- Per-client KMS encryption keys
- -- RDS encryption at rest
- -- S3 server-side encryption
- -- Certificate bytes held in memory only
- -- Temp files: mode 0o600, deleted in finally
Access control
- -- Role-based access (admin, operator, viewer)
- -- Per-client scoping for viewer accounts
- -- Step-up authentication for sensitive operations
- -- Comprehensive audit logging
- -- IAM Access Analyzer for unused permissions
Digital signatures
All bid submissions are signed using GOST R 34.10-2012 digital certificates issued by NCA Kazakhstan. The signing happens server-side without NCALayer -- the private key never leaves the encrypted store. Each company uses its own certificate, isolated at the VM level.