Simplified Architectural Overview


The following high-level model illustrates layered segmentation, identity-bound access, and compartmentalized infrastructure domains.

Logical Security Layers


Layered Enforcement Model


Each horizontal boundary represents a security enforcement layer:

Capabilities:

  • Identity-based overlay authentication
  • Firewall zone segmentation
  • VLAN-backed network isolation
  • Hypervisor-level workload separation
  • Container namespace isolation
  • Management-plane segregation

  • No single layer is trusted in isolation.

    Domain Description


    External / Internet


    Untrusted environment. No direct administrative access permitted.


    Encrypted Identity Overlay


    Implemented via Tailscale (WireGuard-based).

  • Device-bound authentication
  • Tag-based access control lists
  • Separate access tiers for Operations / Audit / Administration
  • Dedicated exit nodes per trust domain

  • Firewall Segmentation Core


    Implemented using OPNsense.

  • Default deny inter-zone policy
  • Strict service-based rule definitions
  • East–West inspection
  • DNS and routing control

  • Core Infrastructure Zone


    Clustered compute environment using Proxmox.

  • Dedicated management VLAN
  • Storage replication network isolated
  • No direct exposure to user-facing segments

  • Containerized Service Layer


    Runtime isolation using Docker.

  • Service-per-container isolation
  • Reverse proxy enforcement boundary
  • No implicit inter-container trust

  • Compromise Containment Model


    If an adversary compromises:


  • SA field device → confined to IoT/Field VLAN
  • A remote laptop → restricted by overlay ACL tier
  • A containerized service → isolated from hypervisor control plane
  • A workload VM → restricted from management plane

  • Compromise Scenario Simulation


    Example:


    Scenario: Field IoT device compromise

    Result:

  • No access to hypervisor management
  • No access to storage backend
  • No lateral traversal to Operations Zone
  • Controlled egress via restricted firewall policy

  • This demonstrates deterministic containment, not theoretical segmentation.

    Contact