Design Transparency

We believe security comes from sound design, not obscurity. Explore our architecture, trust models, and design decisions in detail.

Design Principles

The core principles that guide every architectural decision in EyeLog.

01

Defense in Depth

Multiple independent layers of security. Compromise of one layer doesn't compromise the system. mTLS + Signing + Human Approval.

02

Local Authority

The agent is authoritative on the endpoint. Central infrastructure cannot override local admin decisions without consent.

03

Explicit Over Implicit

Every capability must be explicitly enabled. No default-on behavior. If it's not in the manifest, it's not allowed.

04

Separation of Concerns

Control plane separate from data plane. Each protocol optimized for its purpose. Clear boundaries between components.

05

Graceful Degradation

System continues to function when components fail. Offline agents use cached capabilities. No single point of failure.

06

Auditability

Every command, state change, and capability decision is logged. Full trace of who did what, when, and why.

Quick Reference

Key concepts at a glance.

Channels

gRPC :11129 Control plane (bidirectional)
QUIC :11129 Data plane (agent → collector)

Agent States

READY Idle, accepts commands
EXECUTING Running a command
CONNECTING Establishing connection
DRAINING Graceful shutdown

Manifest Templates

monitor Info + admin (local approval)
monitor-managed Info + admin (remote managed)
full All capabilities

Security Layers

Layer 1 mTLS (transport)
Layer 2 Manifest signing (content)
Layer 3 Local admin approval (human)