VectorVue Documentation

Integration, platform operations, architecture, and assurance references

SpectraStrike ↔ VectorVue Secure Integration Manual

Document Version: 1.0
Last Updated: February 26, 2026
Audience: Security Engineering, Platform Engineering, DevOps, SRE

1. Executive Overview

This document defines the production integration pattern between SpectraStrike and VectorVue after the completed security expansion (Phases 0-9). The integration is designed as zero-trust federation: no implicit network trust, no shared secrets between systems, mandatory mTLS for transport, mandatory Ed25519 payload signatures for telemetry authenticity, cryptographic tenant isolation, tamper-evident logging, and fail-closed CI/CD enforcement.

Threat Model:

2. Architecture Overview

VectorVue uses an internal telemetry gateway as the only accepted ingress path for SpectraStrike telemetry. Gateway controls enforce identity, payload authenticity, freshness, tenant mapping, queue integrity, and tamper-evident audit trails.

flowchart LR
  SS[SpectraStrike Producer]
  GW[VectorVue Telemetry Gateway]
  Q[Internal Secure Queue + DLQ]
  PE[Telemetry Processing Engine]
  EV[Evidence Engine + Envelope Encryption]
  TL[Tamper-Evident Audit Log]
  FED[Federation Verify Endpoint]

  SS -->|mTLS + Ed25519 Signed Telemetry| GW
  GW -->|Validated Events| Q
  Q --> PE
  PE --> EV
  GW --> TL
  SS -->|Signed Federation Bundle| FED
  FED --> TL

Threat Model:

3. Trust Model

Trust is explicit and per-request.

  1. Transport trust: mTLS with service identity certificate pinning.
  2. Message trust: Ed25519 signature verification using configured SpectraStrike public key.
  3. Freshness trust: timestamp skew validation + nonce replay lock.
  4. Tenant trust: signed metadata equality checks + operator-to-tenant mapping.
  5. Processing trust: strict schema + MITRE mapping + sanitization.
  6. Cognitive trust: signed feedback responses bound to tenant and replay-safe nonce/timestamp.

Threat Model:

4. Cryptographic Federation Model

Federation bundles are accepted only when signed evidence envelope fields validate against canonical signature input.

Canonical fields:

Threat Model:

5. Secure Telemetry Flow

  1. SpectraStrike prepares canonical JSON telemetry payload.
  2. SpectraStrike signs message: "{timestamp}.{nonce}." + raw_json using Ed25519 private key.
  3. SpectraStrike sends request over mTLS with required headers.
  4. Gateway validates:
    • service identity + cert fingerprint pin
    • signature integrity
    • timestamp skew and nonce uniqueness
    • operator rate limits
    • strict schema and MITRE mappings
    • signed tenant metadata and operator mapping
  5. Gateway routes accepted payload to secure queue with integrity hash.
  6. Invalid payloads are sent to DLQ with rejection metadata.
  7. All accept/reject outcomes are appended to tamper-evident audit log.
sequenceDiagram
  participant S as SpectraStrike
  participant G as Telemetry Gateway
  participant Q as Secure Queue
  participant D as DLQ
  participant L as Tamper Log

  S->>G: mTLS POST + signature + nonce + timestamp
  G->>G: Identity, signature, replay, tenant, schema checks
  alt Valid
    G->>Q: publish ingest envelope + integrity_hash
    G->>L: append telemetry.accepted
    G-->>S: 202 Accepted
  else Invalid
    G->>D: publish dead_letter envelope
    G->>L: append telemetry.rejected
    G-->>S: 4xx/5xx rejection
  end

Threat Model:

5.6 Cognitive Feedback Flow (Sprint 31 Alignment)

  1. SpectraStrike sends execution graph metadata to /internal/v1/cognitive/execution-graph.
  2. Gateway applies mTLS identity, signature verification, and replay checks.
  3. VectorVue stores graph metadata under tenant scope.
  4. SpectraStrike queries /internal/v1/cognitive/feedback/adjustments/query.
  5. Gateway returns tenant-scoped adjustments with response signature, nonce, and signed timestamp.
  6. SpectraStrike verifies signature + replay window and rejects unsigned/forged/replayed responses.
  7. Only verified adjustments are bound into policy evaluation context.

Required feedback item fields:

6. Identity & Certificate Management

Identity model:

Required controls:

Threat Model:

7. Deployment Topology

Deployment zones:

Topology requirements:

Threat Model:

8. Secure Configuration Steps

  1. Generate/issue service certificates for SpectraStrike producer and VectorVue gateway.
  2. Register SpectraStrike service identity and pinned fingerprint in gateway config.
  3. Configure gateway Ed25519 public key for signature verification.
  4. Enable mTLS and signature-required flags (VV_TG_REQUIRE_MTLS=1, VV_TG_REQUIRE_PAYLOAD_SIGNATURE=1).
  5. Configure nonce backend and TTL; configure rate-limit backend and threshold.
  6. Configure operator-to-tenant mapping and signed metadata enforcement.
  7. Configure queue backend (internal), subjects, and DLQ.
  8. Enable tamper log path and seal interval.
  9. Run CI security enforcement workflow and red-team suite before merge.

Threat Model:

9. SpectraStrike Configuration

Example config.yaml:

spectrastrike:
  producer:
    endpoint: https://vectorvue-telemetry-gateway.internal/internal/v1/telemetry
    service_identity: spectrastrike-producer
    mtls:
      cert_path: /etc/spectrastrike/certs/client.crt
      key_path: /etc/spectrastrike/certs/client.key
      ca_path: /etc/spectrastrike/certs/ca.crt
      verify_peer: true
    signing:
      algorithm: ed25519
      private_key_path: /etc/spectrastrike/keys/telemetry_ed25519.key
      key_id: spectrastrike-ed25519-2026q1
    replay:
      nonce_length: 24
      timestamp_format: unix_epoch_seconds
      max_clock_skew_seconds: 30
    retry:
      max_attempts: 3
      backoff_ms: 500
      jitter_ms: 250

Threat Model:

10. VectorVue Configuration

Example gateway config.yaml representation (maps to environment variables):

vectorvue:
  telemetry_gateway:
    require_mtls: true
    require_payload_signature: true
    allowed_clock_skew_seconds: 30
    nonce_ttl_seconds: 120
    nonce_backend: redis
    redis_url: redis://vectorvue-redis.internal:6379/0
    rate_limit_per_minute: 120
    rate_limit_backend: redis
    queue_backend: nats
    nats_url: nats://vectorvue-nats.internal:4222
    queue_subject: vectorvue.telemetry.ingest
    dlq_subject: vectorvue.telemetry.dlq
    spectrastrike_ed25519_public_key_b64: <base64-32-byte-public-key>
    allowed_service_identities:
      spectrastrike-producer: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    operator_tenant_map:
      op-001: 10000000-0000-0000-0000-000000000001

Threat Model:

11. Telemetry Gateway Setup

  1. Deploy gateway service in private subnet.
  2. Mount identity cert/key/CA and verify file permissions (0400 for keys).
  3. Inject security environment variables from secret manager/config service.
  4. Enable liveness/readiness checks and startup validation.
  5. Restrict ingress to SpectraStrike egress CIDRs + mTLS.
  6. Bind queue and Redis dependencies over internal TLS where available.

Threat Model:

12. mTLS Configuration Steps

Certificate generation example (OpenSSL):

# 1) Root CA
openssl genrsa -out ca.key 4096
openssl req -x509 -new -nodes -key ca.key -sha256 -days 3650 \
  -subj "/CN=VectorVue-Internal-CA" -out ca.crt

# 2) SpectraStrike client cert
openssl genrsa -out spectrastrike.key 2048
openssl req -new -key spectrastrike.key -subj "/CN=spectrastrike-producer" -out spectrastrike.csr
openssl x509 -req -in spectrastrike.csr -CA ca.crt -CAkey ca.key -CAcreateserial \
  -out spectrastrike.crt -days 90 -sha256

# 3) Gateway server cert
openssl genrsa -out gateway.key 2048
openssl req -new -key gateway.key -subj "/CN=vectorvue-telemetry-gateway.internal" -out gateway.csr
openssl x509 -req -in gateway.csr -CA ca.crt -CAkey ca.key -CAcreateserial \
  -out gateway.crt -days 90 -sha256

# 4) Fingerprint pin material
openssl x509 -in spectrastrike.crt -noout -fingerprint -sha256

Certificate validation sequence:

sequenceDiagram
  participant S as SpectraStrike Client
  participant G as Gateway TLS Listener
  participant CA as Internal CA Trust Store
  participant PIN as Fingerprint Pinset

  S->>G: TLS ClientHello + certificate
  G->>CA: Validate chain and expiry
  CA-->>G: Valid/Invalid
  G->>PIN: Compare SHA-256 fingerprint
  PIN-->>G: Match/Mismatch
  alt Valid + Match
    G-->>S: mTLS established
  else Invalid or Mismatch
    G-->>S: handshake reject / 401
  end

Threat Model:

13. Signature Verification Model

Ed25519 signing flow example (producer):

import base64
import json
from nacl.signing import SigningKey

payload = {...}
raw = json.dumps(payload, separators=(",", ":")).encode("utf-8")
timestamp = str(payload["timestamp"])
nonce = payload["nonce"]
message = f"{timestamp}.{nonce}.".encode("utf-8") + raw

sk = SigningKey(open("/etc/spectrastrike/keys/telemetry_ed25519.key", "rb").read())
signature = sk.sign(message).signature
signature_b64 = base64.b64encode(signature).decode("utf-8")

Validation middleware pseudo-code:

function verify_request(req, raw_body):
  enforce_header("X-Service-Identity")
  enforce_header("X-Client-Cert-Sha256")
  enforce_header("X-Telemetry-Timestamp")
  enforce_header("X-Telemetry-Nonce")
  enforce_header("X-Telemetry-Signature")

  enforce_mtls_identity_and_pin(req.service_identity, req.cert_fp)

  ts = parse_int(req.timestamp)
  require(abs(now() - ts) <= allowed_clock_skew_seconds)

  signature = base64_decode(req.signature)
  message = bytes(f"{ts}.{req.nonce}.") + raw_body
  verify_ed25519(signature, message, configured_public_key)

  register_nonce_or_reject(ts, req.nonce)
  return OK

Threat Model:

14. Replay Protection Mechanism

Mechanism:

Threat Model:

15. Tenant Isolation Model

Tenant enforcement path:

  1. signed_metadata.tenant_id/operator_id/campaign_id must match payload top-level fields.
  2. operator_id must map to approved tenant via gateway operator map.
  3. On mismatch, reject with 401 or 403 and append audit entry.
  4. Downstream repositories enforce tenant-scoped query guards.

Threat Model:

16. Evidence Encryption Model

Evidence blob encryption:

Threat Model:

17. Tamper-Evident Logging Model

Audit logging model:

Threat Model:

18. Federation Protocol Specification

Envelope structure (signed evidence bundle):

classDiagram
  class SignedEvidenceBundle {
    +string operator_id
    +string campaign_id
    +string execution_hash
    +int timestamp
    +string nonce
    +string signature
    +extra = forbid
  }

Protocol rules:

Threat Model:

19. Error Handling & Rejection Cases

Primary rejection classes:

Threat Model:

20. Failure & Recovery Scenarios

Scenario matrix:

  1. Redis nonce store unavailable -> gateway returns 503; trigger incident and failover.
  2. Queue unavailable -> publish failure returns 503; replay-safe retries allowed from producer.
  3. High reject rate due to cert expiry -> rotate certs and revalidate pinset.
  4. Signature key mismatch after rotation -> deploy updated public key and rerun signed handshake checks.

Threat Model:

21. Revocation & Kill Switch Procedure

Kill switch objective: immediately stop SpectraStrike-to-VectorVue federation when compromise is suspected.

Procedure:

  1. Open SEV-1 incident and assign Security Commander + Platform Commander.
  2. Revoke SpectraStrike producer cert at CA and distribute CRL/OCSP updates.
  3. Remove producer identity from allowed_service_identities pinset.
  4. Rotate gateway Ed25519 public key to reject previously trusted signatures.
  5. Apply network ACL deny rule from SpectraStrike egress CIDRs.
  6. Run gateway config reload/redeploy.
  7. Validate all inbound producer attempts are rejected (401/403).
  8. Preserve tamper-evident logs and evidence for forensics.

Kill-switch revocation flow:

flowchart TD
  DETECT[Compromise Detected]
  SEV[Declare SEV-1]
  CA[Revoke Producer Cert]
  PIN[Remove Pinned Identity]
  KEY[Rotate Verify Key]
  ACL[Block Network Path]
  DEPLOY[Reload Gateway Config]
  VERIFY[Validate Rejection + Alerts]

  DETECT --> SEV --> CA --> PIN --> KEY --> ACL --> DEPLOY --> VERIFY

Threat Model:

22. Key Rotation Procedure

Rotation targets:

Procedure:

  1. Generate new Ed25519 keypair in secure key store.
  2. Publish new public key to VectorVue config under approved change window.
  3. Deploy producer update to sign with new private key.
  4. Run dual-validation canary (old/new keys where supported).
  5. Decommission old key after cutover confirmation.
  6. Rotate mTLS certificates and update pinset fingerprints.
  7. Execute regression suite + red-team checks.

Threat Model:

23. Audit & Compliance Mapping

Mapping examples:

Evidence artifacts:

Threat Model:

24. Red Team Validation Checklist

Required scenarios before production promotion:

Validation matrix:

Scenario Expected System Behavior Logs Generated Alert Triggered
Invalid signature Gateway rejects request with 401; event is not queued. telemetry.rejected with reason Invalid telemetry signature; tamper log entry hash chained. P1 if signature-failure rate exceeds threshold.
Expired timestamp Gateway rejects request with 401 for clock skew violation. telemetry.rejected with reason Telemetry timestamp out of allowed clock skew. P2 on sustained skew failures (producer clock drift).
Replay attempt First request accepted; second identical nonce rejected with 409. telemetry.accepted for first, telemetry.rejected replay reason for second. P1 on replay spike by source/operator.
Cross-tenant injection Gateway rejects request with 403 on tenant mapping violation. telemetry.rejected with Operator tenant mapping violation. P1 immediate security alert for tenant boundary violation.
Queue corruption (poison attempt) Invalid telemetry rejected with 422 and routed to DLQ only. DLQ envelope (dead_letter) + reject tamper-log entry. P2 on DLQ anomaly growth or repeated schema violations.
Log tampering attempt Integrity verification reports ok=false and mismatch reason. Tamper-log verifier output with entry_hash_mismatch or previous_hash_mismatch. P1 integrity-failure alert (forensic priority).
Certificate revocation Revoked producer cert/fingerprint requests fail mTLS/identity check with 401. telemetry.rejected identity mismatch/revoked cert reason; revocation change logs. P1 if revoked identity still attempts ingress.

Threat Model:

25. Security Hardening Checklist

Threat Model:

26. Operational Runbook

26.1 First-Time Federation Setup

  1. Approve federation request under dual control (Security + Platform).
  2. Issue SpectraStrike producer certificate and register fingerprint pin.
  3. Generate/import Ed25519 keypair for SpectraStrike producer.
  4. Configure gateway public key and identity mapping.
  5. Configure operator-to-tenant mappings.
  6. Run dry-run telemetry and federation verification tests.
  7. Run compliance verification and red-team suite.
  8. Approve production cutover.

26.2 Certificate Issuance

  1. Open change request with owner, scope, validity period.
  2. Generate CSR and sign with internal CA.
  3. Record fingerprint, serial, not-before/not-after.
  4. Store artifacts in controlled secret distribution path.
  5. Update pinset and deploy.

26.3 Gateway Deployment

  1. Build from signed, approved commit.
  2. Inject config through deployment system (no shell overrides).
  3. Validate health endpoint and required controls.
  4. Run smoke test: valid signed message accepted, invalid message rejected.

26.4 SpectraStrike Registration

  1. Assign service identity string.
  2. Register cert fingerprint in gateway allowlist.
  3. Register signing key metadata (key ID and activation time).

26.5 Tenant Mapping Configuration

  1. Submit operator-to-tenant mapping change under ticket.
  2. Validate UUID format and uniqueness.
  3. Deploy and run cross-tenant rejection test.

26.6 Compliance Verification Test

  1. Execute CI security workflow.
  2. Archive reports and hashes.
  3. Verify audit chain integrity.

26.7 Red Team Validation

  1. Execute full phase-9 simulation suite.
  2. Review failures as release blockers.
  3. Record sign-off from Security Architect and Release Manager.

Threat Model:

27. CI/CD Integration Notes

Required workflow controls:

Branch policy:

Threat Model:

28. Monitoring & Alerting Setup

Metrics and alerts:

Alert severities:

Threat Model:

29. Performance & Scalability Notes

Guidance:

Threat Model:

30. Known Limitations & Residual Risk

  1. SD-01 (Medium): HSM is abstracted but not strictly enforced in every runtime profile.
  2. SD-02 (High): Tamper-evident log chain is local-first; remote immutable anchoring is not mandatory baseline.
  3. SD-03 (Medium): Kill switch requires coordinated multi-step revocation, not single atomic control.
  4. Federation replay controls should be expanded with endpoint-specific nonce cache and policy.
  5. Runtime config drift protection depends on deployment governance outside CI.

Threat Model:

31. Future Federation Enhancements

Threat Model:

32. Governance & Dual Control Processes

Approval authorities:

Dual control requirements:

Threat Model:

Service-to-Service Zero-Trust Model Diagram

flowchart LR
  SS[SpectraStrike Service]
  GW[Telemetry Gateway]
  AUTH[Identity + Cert Pin Validation]
  SIG[Ed25519 Signature Verification]
  RP[Replay Protection]
  TM[Tenant Mapping Enforcement]
  Q[Internal Queue]

  SS --> GW
  GW --> AUTH --> SIG --> RP --> TM --> Q

Integration Readiness Checklist

Production Go-Live Checklist

Incident Response Quick Reference

  1. Detect anomaly (signature failures, replay spike, cert mismatch surge).
  2. Declare incident severity and assign commander.
  3. Freeze non-essential config changes.
  4. If compromise suspected, execute kill-switch procedure.
  5. Preserve tamper-evident logs and CI artifacts.
  6. Rotate affected certs/keys.
  7. Re-run red-team and regression validation before restore.
  8. Document root cause and corrective actions.

Federation Revocation Emergency Steps

  1. Revoke SpectraStrike cert at internal CA.
  2. Remove SpectraStrike service identity pin from gateway config.
  3. Rotate gateway trusted Ed25519 public key.
  4. Apply network deny rules for producer source ranges.
  5. Redeploy gateway and verify all requests rejected.
  6. Archive incident timeline, log chain verification, and remediation approvals.