Objective
Run a single, evidence-based security mapping program across the ecosystem (not limited to 1Password Connect) to establish risk visibility, ownership, and a prioritized remediation backlog.
Scope
- Orgs/repos:
chittyos, chittyapps, chittyfoundation, chittycorp, furnished-condos
- Layers:
- Identity and secrets (1Password Connect/service accounts, token flows, rotation paths)
- CI/CD controls (branch protection, required checks, SCA, secret scanning, provenance)
- Application and API authz/authn boundaries (MCP gateways, service-to-service trust)
- Data stores and custody (Neon, D1, KV, R2, backups, encryption, retention)
- Runtime/network exposure (Cloudflare routes, workers, containers, ingress, egress)
- Observability and incident response readiness
Deliverables
- Security topology map (systems, trust boundaries, identity edges)
- Control matrix by repo/service (implemented vs missing)
- Risk register with severity, blast radius, owner, and due date
- Prioritized remediation plan (P0/P1/P2) with implementation tickets
- Verification checklist and recurring review cadence
Workstreams
WS1 Asset inventory and dependency graph
WS2 Identity/secrets mapping (human + machine credentials)
WS3 CI/CD and SDLC control mapping
WS4 Runtime and data-plane hardening map
WS5 Threat scenarios + abuse path validation
WS6 Remediation execution and closure evidence
Acceptance Criteria
Initial P0 Focus
- Service-token strategy (non-interactive, least-privilege, rotation tested)
- Secrets exposure prevention (history scan + CI secret gates)
- Durable auth boundaries for MCP/service ingress
- Baseline branch protection and required checks across orgs
Notes
This issue is the tracking epic. Follow-up implementation issues should link back here and include concrete evidence (logs/screenshots/report artifacts).
Objective
Run a single, evidence-based security mapping program across the ecosystem (not limited to 1Password Connect) to establish risk visibility, ownership, and a prioritized remediation backlog.
Scope
chittyos,chittyapps,chittyfoundation,chittycorp,furnished-condosDeliverables
Workstreams
WS1Asset inventory and dependency graphWS2Identity/secrets mapping (human + machine credentials)WS3CI/CD and SDLC control mappingWS4Runtime and data-plane hardening mapWS5Threat scenarios + abuse path validationWS6Remediation execution and closure evidenceAcceptance Criteria
Initial P0 Focus
Notes
This issue is the tracking epic. Follow-up implementation issues should link back here and include concrete evidence (logs/screenshots/report artifacts).