Skip to main content

Security Overview

Anava is built with security as a core design principle. We apply zero-trust access controls, hardware-backed device identity, and end-to-end encryption to protect customer environments.

Core Principles

  • Zero trust: Every request is authenticated and authorized.
  • Least privilege: Users, devices, and services get only the access they need.
  • Defense in depth: Multiple layered controls protect against failures.
  • Auditability: Administrative actions are logged and reviewable.

Defense in Depth

Identity & Access

User Access

  • SSO/OAuth for enterprise identity providers
  • MFA for privileged access
  • RBAC with role-based permissions

Device Access

  • Hardware-backed identity via IEEE 802.1AR certificates
  • Mutual TLS for device-to-cloud communication

Data Protection

  • Encryption in transit for all network communication
  • Encryption at rest for stored data
  • Tenant isolation to separate customer data

Monitoring & Audit Logging

  • Centralized security logging
  • Alerting on anomalous behavior
  • Audit trails for administrative actions

Compliance

Anava supports enterprise compliance requirements including SOC 2 Type II and GDPR. See Compliance for the public compliance overview.

Internal Security Details

Detailed security architecture, firewall rules, and implementation-specific controls are documented in the internal security section for authorized team members and NDA customers.

Internal Security Docs