Skip to main content

Security Documentation

📋 Overview

Security documentation for the Physical AI Toolchain covering threat analysis, deployment hardening, and vulnerability reporting.

📄 Documents

DocumentDescription
Threat ModelSTRIDE-based threat analysis and remediation roadmap
Deployment Security GuideSecurity configuration inventory and deployment responsibilities
Release VerificationVerify release artifact provenance and SBOM attestations
Workflow PermissionsGitHub Actions permission scopes and OSSF Scorecard exceptions
SECURITY.mdVulnerability disclosure and reporting process

🔒 Security Posture

This reference architecture deploys AKS clusters with GPU node pools, Azure Machine Learning, and NVIDIA OSMO for robotics training and inference. All components are infrastructure-as-code artifacts; no hosted service or user-facing application exists.

The threat model documents:

  • 19 threats across STRIDE categories
  • Security controls mapped to each threat
  • Trust boundary analysis across IaC, cluster, and ML pipeline layers
  • Prioritized remediation roadmap

The security guide documents:

  • Default security configurations shipped with the architecture
  • Deployment team responsibilities before, during, and after provisioning
  • Security considerations checklist with Azure documentation references

🛠️ Operational Scripts

Automated security and freshness checks that run on GitHub Actions schedules and publish findings to the Security tab.

ScriptWorkflowPurpose
scripts/security/Test-BinaryFreshness.ps1check-binary-integrity.ymlVerify pinned binary SHA-256 hashes and detect Helm chart version drift (SARIF output)
scripts/security/Test-DependencyPinning.ps1dependency-pinning-scan.ymlValidate that GitHub Actions, Docker images, and package manifests pin exact versions
scripts/security/Test-SHAStaleness.ps1sha-staleness-check.ymlDetect SHA pins that have drifted behind upstream release tags
scripts/update-chart-hashes.shRun manually after chart bumpsRefresh pinned Helm chart versions and SHA-256 hashes in infrastructure/setup/defaults.conf

Each PowerShell script supports a -SarifFile parameter for CI integration and a -ConfigPreview switch for local dry-run inspection. Run scripts/update-chart-hashes.sh locally whenever a pinned Helm chart version is updated so defaults.conf stays in sync.


🤖 Crafted with precision by ✨Copilot following brilliant human instruction, then carefully refined by our team of discerning human reviewers.