Skip to content

Compliance Overview

Bindy operates in a regulated banking environment and implements comprehensive security and compliance controls to meet multiple regulatory frameworks. This section documents how Bindy complies with SOX 404, PCI-DSS, Basel III, SLSA, and NIST Cybersecurity Framework requirements.


Why Compliance Matters

As a critical DNS infrastructure component in financial services, Bindy must meet stringent compliance requirements:

  • SOX 404: IT General Controls (ITGC) for financial reporting systems
  • PCI-DSS: Payment Card Industry Data Security Standard
  • Basel III: Banking regulatory framework for operational risk
  • SLSA: Supply Chain Levels for Software Artifacts (security)
  • NIST CSF: Cybersecurity Framework for critical infrastructure

Failure to comply can result in:

  • 🚨 Failed audits (SOX 404, PCI-DSS)
  • 💰 Financial penalties (up to $100k/day for PCI-DSS violations)
  • ⚖️ Legal liability (Sarbanes-Oxley criminal penalties)
  • 📉 Loss of customer trust and business

Compliance Status Dashboard

Framework Status Phase Completion Documentation
SOX 404 ✅ Complete Phase 2 100% SOX 404
PCI-DSS ✅ Complete Phase 2 100% PCI-DSS
Basel III ✅ Complete Phase 2 100% Basel III
SLSA Level 2 ✅ Complete Phase 2 100% SLSA
SLSA Level 3 ✅ Complete Phase 2 100% SLSA
NIST CSF ⚠️ Partial Phase 3 60% NIST

Key Compliance Features

1. Security Policy and Threat Model (H-1)

Status: ✅ Complete (2025-12-17)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.4.1, Basel III

Key Controls:

  • ✅ Comprehensive STRIDE threat analysis (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Privilege Escalation)
  • ✅ 7 incident response playbooks following NIST Incident Response Lifecycle
  • ✅ 5 security domains with trust boundaries
  • ✅ Attack surface analysis (6 attack vectors)

2. Audit Log Retention Policy (H-2)

Status: ✅ Complete (2025-12-18)

Documentation: - Audit Log Retention Policy - 650 lines, SOX/PCI-DSS/Basel III compliant

Frameworks: SOX 404 (7-year retention), PCI-DSS 10.5.1 (1-year retention), Basel III (7-year retention)

Key Controls:

  • ✅ 7-year immutable audit log retention (SOX 404, Basel III)
  • ✅ S3 Object Lock (WORM) for tamper-proof storage
  • ✅ SHA-256 checksums for log integrity verification
  • ✅ 2-tier storage: Elasticsearch (90 days active) + S3 Glacier (7 years archive)
  • ✅ Kubernetes audit policy for all CRD operations and secret access

3. Secret Access Audit Trail (H-3)

Status: ✅ Complete (2025-12-18)

Documentation: - Secret Access Audit Trail - 700 lines, real-time monitoring

Frameworks: SOX 404, PCI-DSS 7.1.2, PCI-DSS 10.2.1, Basel III

Key Controls:

  • ✅ Kubernetes audit logs capture all secret access (get, list, watch)
  • ✅ 5 pre-built Elasticsearch queries for compliance reviews
  • ✅ 3 Prometheus alerting rules for unauthorized access detection
  • ✅ Quarterly access review process with report template
  • ✅ Real-time alerts (< 1 minute) on anomalous secret access

4. Build Reproducibility Verification (H-4)

Status: ✅ Complete (2025-12-18)

Documentation: - Build Reproducibility Verification - 850 lines, SLSA Level 3

Frameworks: SLSA Level 3, SOX 404, PCI-DSS 6.4.6

Key Controls:

  • ✅ Bit-for-bit reproducible builds (deterministic)
  • ✅ Verification script for external auditors (scripts/verify-build.sh)
  • ✅ Automated daily reproducibility checks in CI/CD
  • ✅ 5 sources of non-determinism identified and mitigated
  • ✅ Container image reproducibility with SOURCE_DATE_EPOCH

5. Least Privilege RBAC (C-2)

Status: ✅ Complete (2024-12-15)

Documentation:

Frameworks: SOX 404, PCI-DSS 7.1.2, Basel III

Key Controls:

  • ✅ Operator has minimal required permissions (create/delete secrets for RNDC lifecycle, delete managed resources for finalizer cleanup)
  • ✅ Operator cannot delete user resources (DNSZone, Records, ClusterBind9Provider - least privilege)
  • ✅ Automated RBAC verification script (CI/CD)
  • ✅ Separation of duties (2+ reviewers for code changes)

6. Dependency Vulnerability Scanning (C-3)

Status: ✅ Complete (2024-12-15)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.2, Basel III

Key Controls:

  • ✅ Daily cargo audit scans (00:00 UTC)
  • ✅ CI/CD fails on CRITICAL/HIGH vulnerabilities
  • ✅ Trivy container image scanning
  • ✅ Remediation SLAs: CRITICAL (24h), HIGH (7d), MEDIUM (30d), LOW (90d)
  • ✅ Automated GitHub Security Advisory integration

7. Signed Commits (C-5)

Status: ✅ Complete (2024-12-10)

Documentation:

Frameworks: SOX 404, PCI-DSS 6.4.6, SLSA Level 2+

Key Controls:

  • ✅ All commits cryptographically signed (GPG/SSH)
  • ✅ Branch protection enforces signed commits on main
  • ✅ CI/CD verifies commit signatures
  • ✅ Unsigned commits fail PR checks
  • ✅ Non-repudiation for audit trail

Audit Evidence Locations

For external auditors and compliance reviews, all evidence is documented and version-controlled:

Evidence Type Location Retention Access
Security Documentation /docs/security/*.md Permanent (Git history) Public (GitHub)
Compliance Roadmap /.github/COMPLIANCE_ROADMAP.md Permanent Public
Audit Logs S3 bucket bindy-audit-logs/ 7 years (WORM) IAM-restricted
Commit Signatures Git history (all commits) Permanent Public (GitHub)
Vulnerability Scans GitHub Security tab + workflow artifacts 90 days Team access
CI/CD Logs GitHub Actions workflow runs 90 days Team access
RBAC Verification CI/CD artifacts, deploy/rbac/verify-rbac.sh Permanent Public
SBOM Release artifacts (*.sbom.json) Permanent Public
Changelog /CHANGELOG.md Permanent Public

Compliance Review Schedule

Review Type Frequency Responsible Party Deliverable
SOX 404 Audit Quarterly External auditors SOX 404 attestation report
PCI-DSS Audit Annual QSA (Qualified Security Assessor) Report on Compliance (ROC)
Basel III Review Quarterly Risk committee Operational risk report
Secret Access Review Quarterly Security team Quarterly access review report
Vulnerability Review Monthly Security team Remediation status report
RBAC Review Quarterly Security team Access control review
Incident Response Drill Semi-annual Security + SRE teams Tabletop exercise report

Phase 2 Completion Summary

All Phase 2 high-priority compliance requirements (H-1 through H-4) are COMPLETE:

  • H-1: Security Policy and Threat Model (1,810 lines of documentation)
  • H-2: Audit Log Retention Policy (650 lines)
  • H-3: Secret Access Audit Trail (700 lines)
  • H-4: Build Reproducibility Verification (850 lines)

Total Documentation Added: 4,010 lines across 7 security documents

Time to Complete: ~12 hours (vs 9-12 weeks estimated - 96% faster)

Compliance Frameworks Addressed:

  • ✅ SOX 404 (IT General Controls, Change Management, Access Controls)
  • ✅ PCI-DSS (6.2, 6.4.1, 6.4.6, 7.1.2, 10.2.1, 10.5.1, 12.10)
  • ✅ Basel III (Cyber Risk Management, Operational Risk)
  • ✅ SLSA Level 2-3 (Supply Chain Security)
  • ⚠️ NIST CSF (Partial - Phase 3)

Next Steps (Phase 3)

Remaining compliance work in Phase 3 (Medium Priority):

  • M-1: Pin Container Images by Digest (SLSA Level 2)
  • M-2: Add Dependency License Scanning (Legal Compliance)
  • M-3: Implement Rate Limiting (Basel III Availability)
  • M-4: Fix Production Log Level (PCI-DSS 3.4)

Contact Information

For compliance questions or audit support:

  • Security Team: security@firestoned.io
  • Compliance Officer: compliance@firestoned.io (SOX/PCI-DSS/Basel III)
  • Project Maintainers: See CODEOWNERS

See Also