Security Model
Security architecture and operational security practices for the Demiton platform.
Security is a foundational principle of the Demiton platform.
The system is designed to ensure that enterprise workflows execute safely across connected systems.
The security model focuses on:
• identity enforcement
• secure system interaction
• controlled execution boundaries
Identity Enforcement
Every meaningful action within the platform is associated with an identity.
Identity information is used for:
• access control
• workflow attribution
• governance decisions
Identity may originate from:
• user authentication sessions
• scheduled system tasks
• automated workflow triggers
All workflow runs record the initiating identity.
Adapter Security
Adapters interact with external systems.
Secure adapter behavior requires:
• encrypted network communication
• secure credential storage
• limited system permissions
Credentials must never be written to logs or exposed to workflow logic.
Data Handling
Sensitive data must be handled carefully during workflow execution.
Best practices include:
• avoiding unnecessary persistence
• encrypting sensitive fields
• minimizing data exposure
Workflow data should only be accessible to the steps that require it.
AI Layer Security
The AI layer retrieves documents using identity-based access controls.
Indexed documents include access control fields:
allowed_entra_users
allowed_entra_groups
Retrieval queries apply these filters before returning results to the model.
This ensures users only receive information they are authorized to access.
Infrastructure Security
Deployment environments should follow standard cloud security practices.
Examples include:
• encrypted database connections
• private network access for internal services
• secure secret management
Production credentials must never appear in application configuration files.
Operational Security Practices
Organizations should implement several operational practices.
These include:
• rotating credentials regularly
• reviewing access permissions
• monitoring suspicious activity
Security reviews should occur periodically to ensure the platform remains compliant with organizational policies.
Summary
The Demiton security model combines identity enforcement, adapter isolation, and controlled execution boundaries.
These principles ensure that enterprise workflows execute safely across complex operational environments.
---