Security

Security Architecture

Complete security overview: VaultGuard360 runs in your Azure tenant, is read-only by design, and the publisher has zero access to your data.


VaultGuard360 is designed with a security-first architecture. It deploys entirely within your Azure tenant, operates read-only on Key Vault metadata, and is built so that the publisher has no access to your environment or data.


Security Model

VaultGuard360 deploys as an Azure Managed Application into your subscription. Every component runs within your tenant — no data leaves your environment except outbound alert notifications (email, webhooks) that you configure.

Core guarantees:

  • All compute, storage, and monitoring run in your Azure subscription
  • The application is read-only by design — it can list metadata but never retrieve secret values
  • The publisher has zero access to your deployment (no Contributor, no JIT, no standing permissions)
  • There are no telemetry calls, license checks, or analytics calls to the publisher

What VaultGuard360 Can and Cannot Access

Can access (read-only metadata)

  • Item names (secret names, certificate names, key names)
  • Expiration dates
  • Vault names and subscription IDs
  • Admin email addresses you configure

Cannot access

  • Secret values
  • Certificate contents or private keys
  • Key material
  • Any resource outside the Key Vaults you grant access to

The assigned RBAC roles do not include value-retrieval permissions. This is a hard constraint enforced by Azure's permission model — not a policy or configuration choice.


Authentication

User Authentication

Dashboard access is protected by Microsoft Entra ID SSO, configured automatically during deployment.

ControlImplementation
Identity ProviderMicrosoft Entra ID
MFAInherited from your Conditional Access policies
Session managementConfigurable via Conditional Access sign-in frequency policy
Fail-closedAuthentication enforced at the platform level, before application code runs
Unauthenticated endpointsOnly /api/health (returns status only, no sensitive data)

Service Authentication

The application uses a user-assigned managed identity for all internal authentication. No passwords, API keys, or connection strings are used for Key Vault access.


RBAC (Least Privilege)

RoleScopePurposeDoes NOT permit
Key Vault ReaderSubscriptionList vault metadata, item names, expiry datesRead secret values, private keys, key material

Note: Key Vault Reader is the only role granted on your subscriptions. The application does not use the Azure Reader role for vault access.

Additional roles scoped to resources within the managed resource group only are required for internal operations and email delivery. These have no access outside the managed resource group.


Zero Publisher Access

The publisher (Sentinel Vault Systems) has zero access to your managed resource group:

  • No Contributor role
  • No JIT (Just-In-Time) access
  • No standing permissions of any kind

This is configured as "No access" in the Azure Marketplace Partner Center. The publisher cannot view, modify, delete, or query any resources in your deployment.

The customer has ReadOnly access to the managed resource group — you can view resources and query logs, but cannot modify or delete anything (enforced by Azure deny assignments).


Data Protection

Data Collected (Metadata Only)

DataSensitivity
Item names and expiry datesLow–Medium
Vault names, subscription IDsLow
Admin email addresses (user-configured)PII
Scan timestamps and countsLow

Encryption

  • At rest: AES-256 encryption (Azure Storage Service Encryption)
  • In transit: TLS 1.2+ enforced, HTTPS only

Data Residency

All data is stored in encrypted storage within your managed resource group, in the Azure region you select during deployment. Email delivery data location is separately selectable (US, Europe, Asia Pacific, Australia, UK). The publisher does not host or replicate customer data.

Credential Handling

Integration credentials (webhook secrets, SMTP passwords) are stored encrypted within your subscription and are never returned in API responses. The configuration export tool excludes all credentials.


Network Security

Baseline Controls (All Tiers)

  • HTTPS only, TLS 1.2 minimum enforced
  • No inbound ports besides HTTPS (443)
  • Security headers: Content-Security-Policy, X-Content-Type-Options, X-Frame-Options, Cache-Control
  • SSRF protection on webhook and SMTP targets
  • Request payload size limits with input validation

Security Posture by Tier

LayerTrial / ProfessionalEnterprise
Application endpointPublic endpoint + Entra ID authenticationPrivate Endpoint (inbound restricted to VNet)
Data storageAuthenticated access (Entra ID + RBAC)Private Endpoint — default deny from public networks
Log retentionEntra ID + RBAC auth requiredPrivate-only via AMPLS (ingestion + queries)
MonitoringEntra ID + RBAC auth requiredPrivate-only via AMPLS
VNet IntegrationN/AFull VNet integration — all outbound traffic routed through VNet

See Network Isolation for full Enterprise private networking documentation.


Defense in Depth

VaultGuard360 implements multiple layers of hardening controls:

  • HMAC-signed webhooks — all outbound webhook payloads are cryptographically signed so receivers can verify authenticity
  • Content Security Policy (CSP) — strict browser-side protections against XSS and injection
  • SSRF blocking — webhook and SMTP targets are validated to prevent server-side request forgery
  • KQL injection prevention — parameterized queries prevent log query injection attacks
  • Rate limiting — API endpoints enforce request rate limits to prevent abuse
  • Input validation — all user inputs validated with strict schemas and size limits
  • Fail-closed authentication — enforced at the platform level, before application code runs
  • Audit logging — all scans and configuration changes logged with correlation IDs, 365-day retention
  • No runtime dependencies — no external package downloads during operation

Compliance Alignment

VaultGuard360 supports your compliance efforts. It does not hold independent certifications.

ControlImplementationSOC 2ISO 27001GDPR
AuthenticationEntra ID, fail-closedCC6.1, CC6.6A.9.2.1, A.9.4.2Art. 32
Least-Privilege RBACKey Vault Reader onlyCC6.3A.9.2.3Art. 25
Encryption at RestAzure SSE (AES-256)CC6.1A.10.1.1Art. 32(1)(a)
Encryption in TransitTLS 1.2+, HTTPS onlyCC6.7A.13.1.1Art. 32(1)(a)
Audit LoggingMonitoring and audit records, 365-day retentionCC7.2, CC7.3A.12.4.1Art. 30
Network IsolationEnterprise: AMPLS + Private EndpointsCC6.6A.13.1.1Art. 32
Data ResidencyCustomer-selected Azure regionCC6.5A.18.1.4Art. 44–49
Data MinimizationMetadata only, never secret valuesCC6.5A.8.2.1Art. 5(1)(c)
Vendor AccessManaged Application with zero-access publisherCC9.2A.15.1.1Art. 28

Shared Responsibility

Sentinel Vault SystemsCustomer
Application code security and updatesEntra ID tenant configuration and MFA policies
Deployment template securityRestricting dashboard access to authorized users/groups
Vulnerability remediationSubscription security and governance
SLA: 99.5% (Professional/Enterprise)RBAC scope decisions (which subscriptions to scan)
Security incident notificationMonitoring Activity Log for managed resource group

Threat Model

ScenarioImpactResidual RiskMitigation
Application compromiseLowLowRead-only RBAC; cannot access secret values; fail-closed auth
Managed identity theftLowLowLeast-privilege roles; short-lived tokens; no write permissions
Data exfiltrationLow–MediumLowMetadata only; credentials excluded from API responses and exports
Publisher compromiseMediumMediumStandard Azure Managed Application model; Activity Log auditing

Blast radius if compromised: An attacker could access item names and expiry dates. They cannot access secret values, modify resources, or escalate privileges.