Skip to main content

Safety-Critical Security Architecture

Defense in depth for financial infrastructure. Zero-trust networking, multi-tenant isolation, and immutable audit trails.

Architecture for Security

LayerMechanismStatus
GatewayAPI gateway with TLS termination, rate limiting, and authentication middlewareImplemented
ApplicationTenant context injected by gateway (X-Tenant-ID), never trusted from caller. OAuth2 client_credentials per tenant.Implemented
DatabaseRow-Level Security per tenant. Non-superuser role for all application queries.Implemented

Zero public exposure of core banking services. Reads execute directly against the finance service; writes route through the durable execution engine.

Data Protection

Encryption at restDatabase tablespace encryption, ledger engine file-level encryption
Encryption in transitTLS 1.3 at the gateway, isolated internal network for service-to-service communication
Data isolationPer-tenant RLS, tenant-scoped API keys
Audit trailSHA-256 hash-chained audit events (DORA Art. 11)
RetentionConfigurable per jurisdiction (GoBD: 10 years, HGB §257)

Regulatory Alignment

RegulationStatusHow FERNEL Addresses It
DORA (2022/2554)Architecturally alignedMinimal dependency chain (~30 transitive deps), durable execution journal, hash-chained audit, deterministic restart.
PSD2 (2015/2366)Covered (core)SCA via OAuth2, value date tracking (Art. 87), R-transaction taxonomy (Art. 71, 76).
PSD3/PSRMonitoringVoP and fraud liability not yet implemented. Gap analysis completed.
EMD2 (2009/110)Covered (core)Safeguarding account types, float isolation, e-money account model.
AMLD5/6Covered (core)AML screening, KYC/KYB, CDD policy engine, blacklist management.
GDPR (2016/679)Designed forData minimization, right to erasure (soft-delete with audit), processing records.
NIS2 (2022/2555)MonitoringIncident reporting and supply chain assessment planned.
IPR (2024/886)PlannedSEPA Instant architecture defined. 10-second SLA, 24/7 availability pending.

Fernel provides architectural foundations designed for strict regulatory compliance. Certification requires formal audit.

Supply Chain Transparency

Financial core service~15 external dependencies, ~30 transitive
Durable workflow engineMinimal curated dependencies, auditable dependency graph
Management interfaceLarger dependency tree, but not in the critical financial path

DORA Art. 15 alignment: ICT third-party risk assessment for all critical providers. The financial core is built on a high-performance systems stack with a deliberately minimal dependency footprint.

Incident Response and Recovery

Every state-changing operation is journaled by the durable execution engine. Recovery after a failure means replaying the journal from the last checkpoint. No manual intervention required for transient infrastructure failures.

The ledger engine uses a replicated write-ahead log with 128-bit end-to-end checksums and strict serializability. Continuous archiving provides database-level backup. Ledger-native replication provides engine-level redundancy. No scheduled maintenance windows for the ledger (designed for 24/7 operation).

What We Do Not Yet Have

  • SOC 2 Type II certification: planned, not yet obtained.
  • ISO 27001 certification: planned, not yet obtained.
  • Penetration test report: scheduled, not yet completed.
  • PCI-DSS: not applicable (no card data stored directly).

We publish this section because transparency about our current state is more valuable than claiming certifications we do not hold.