Absolute DB is secured at every layer: network, authentication, authorisation, storage, and audit. No external security libraries required.
Security is not a bolt-on module — it is woven into every subsystem. Absolute DB implements a multi-layer security model:
| Layer | Protection |
|---|---|
| Network | Native TLS 1.3, post-quantum hybrid (X25519 + ML-KEM-768), SNI, ALPN |
| Authentication | Password (Argon2id), LDAP/Active Directory, OAuth2/OIDC JWT (Auth0, Okta, Keycloak, Azure AD) |
| Authorisation | RBAC, ABAC, Row-Level Security (RLS), dynamic data masking |
| Encryption at rest | AES-256-GCM column encryption, KMS-managed DEKs, per-tenant keys |
| Zero-trust | mTLS + SPIFFE/SVID, per-peer ACLs, hot certificate rotation |
| Audit | SHA-256 hash-chained audit log, WORM mode, Merkle tree validation |
| Memory safety | Compile-time bounds checking, secure memory zeroing, arena-based allocation |
| Post-quantum | FIPS 203 (ML-KEM-768), FIPS 204 (ML-DSA-65), FIPS 205 (SLH-DSA) |
Absolute DB implements TLS 1.3 (RFC 8446) from scratch in pure C11 — no OpenSSL, no libssl, no GnuTLS. This eliminates the most common database attack vector: outdated or misconfigured TLS libraries.
Absolute DB is quantum-ready with FIPS 203/204/205 implementations:
| Standard | Algorithm | Use Case |
|---|---|---|
| FIPS 203 | ML-KEM-768 (Kyber) | Key encapsulation for TLS handshake |
| FIPS 204 | ML-DSA-65 (Dilithium) | Node identity certs, audit log signing, WAL signing |
| FIPS 205 | SLH-DSA (SPHINCS+) | CA root certificates, software release signing |
All PQC implementations pass FIPS 140-3 Known Answer Tests (KAT). Run make pqc-kat to verify.
GRANT CONNECT FROM 'spiffe://cluster.local/...' TO ROLE readonlyEvery security-relevant action is recorded in a tamper-evident audit log:
~154 KB binary · zero external dependencies · 2,737 tests passing