SpectraStrike Documentation

Operational, architecture, SDK, and integration guidance

SpectraStrike Threat Model v1.0 (Sprint 18)

1. Scope

This model formalizes threat coverage for Phase 5.5 across four primary planes:

Methodology: STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege).

2. Trust Boundary Diagram

flowchart LR
    Operator["Operator UI/TUI"]
    Control["Control Plane\n(Orchestrator + OPA client)"]
    OPA["OPA Policy Engine"]
    Broker["Broker\n(RabbitMQ)"]
    Runner["Universal Runner"]
    C2["C2 Adapter Gateway"]
    Vault["Vault/HSM"]
    Ledger["Audit + Ledger + Telemetry Store"]

    Operator -->|OIDC Session + task intent| Control
    Control -->|policy input| OPA
    OPA -->|allow/deny + policy hash| Control
    Control -->|manifest JWS request| Vault
    Vault -->|signed manifest| Control
    Control -->|JWS envelope| Broker
    Broker -->|dispatch| Runner
    Broker -->|stateful commands| C2
    Runner -->|events + findings| Broker
    C2 -->|session telemetry| Broker
    Broker -->|normalized events| Ledger

Trust boundaries:

3. Threat Scenarios by STRIDE

3.1 Malicious Operator Scenarios

3.2 Compromised Runner Scenarios

3.3 Supply-Chain Compromise Scenarios

3.4 Cross-Tenant Escalation Scenarios

4. Threat-to-Mitigation Mapping

Threat IDs Primary mitigations in code/architecture
S1, E1, E4 AAA role gates (src/pkg/security/aaa_framework.py), OPA capability policy (config/opa/policies/capabilities.rego)
T1, T2, T4 JWS manifest signing and verification (src/pkg/orchestrator/jws.py, src/pkg/runner/jws_verify.py)
R1, R2, R3, R4 Audit trail chain (src/pkg/orchestrator/audit_trail.py), legal governance controls (src/pkg/governance/legal_enforcement.py)
I1, I4 Tenant-aware request guards and authorization checks (ui/web/app/lib/request-guards.ts, ui/web/app/lib/auth-store.ts)
D1, D2, D4 Queue-based async dispatch and bounded retry semantics (src/pkg/orchestrator/messaging.py, src/pkg/orchestrator/event_loop.py)
I2, E2 Runner network policy fencing (src/pkg/runner/network_policy.py) and signature checks (src/pkg/runner/jws_verify.py)
S3, T3, I3, E3 Supply-chain controls (SBOM/signature scripts in docker/scripts/security/) and Armory authorization checks (src/pkg/armory/service.py)
D3 QA blocker recording and deterministic CI checks (docs/manuals/QA_RUNBOOK.md, tests/qa/test_docs_qa.py)

Unresolved risks and required remediations are tracked in:

6. Threat Model Status