Skip to content

cyber-physical-engineering/opensource_truststack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Open Source Trust Assurance Stack

Trust nothing. Prove everything.

This is an open-source toolkit for trust assurance: security monitoring, access control, auditability, integrity, and verifiable provenance around regulated data and critical systems. No vendor lock-in. No magic. Just plumbing you control.

Designed for environments handling sensitive data, connected devices, and AI—healthcare, defense, manufacturing, food & beverage—where leaders must show controls can be proven, not just asserted.

Reference Implementation

A working Docker Compose reference implementation is available in the reference-implementation directory. It includes:

  • Observability: OpenObserve, Grafana, Prometheus
  • Incident Response: FIR
  • Simulation: A data generator for testing telemetry

The Stack (Tool Index)

Common Baseline (The Foundation)

Get the foundation right before picking specialized tools.

Secure — Detection and Telemetry

Where you catch bad actors and honest mistakes.

  • Wazuh — Endpoint security and log analysis; host telemetry.
  • Suricata — Network IDS; packet-based detections.
  • Zeek — Network telemetry; high-fidelity protocol logs.
  • Falco — Runtime detection; suspicious process/container behaviors.
  • osquery — Endpoint inventory as SQL.
  • YARA — Content and malware pattern matching.
  • Sigma — Generic signature format for SIEM systems.

Secure — Network Policy & Segmentation

  • Cilium — eBPF-powered networking and security.
  • Calico — Kubernetes network policy and enforcement.

Secure — OT & Edge Connectivity

  • EdgeX Foundry — Edge integration framework.
  • MQTT — Lightweight pub/sub protocol for IoT.
  • OPC UA — Industrial interoperability protocol.

Secure — Core Data Stores

  • PostgreSQL — Durable relational store.
  • MariaDB — Relational alternative (common in ERPs).
  • Redis — Cache and message broker.

Control — Identity, Access & Policy

Control — AI Gateway & Guardrails

Control — Automation & Response

  • TheHive — Security Incident Response Platform.
  • n8n — Workflow automation.
  • Shuffle — Open source SOAR.
  • StackStorm — Event-driven automation.

Control — Secrets & Keys

Comply — Health & Quality

  • HAPI FHIR — Complete implementation of the HL7 FHIR standard in Java.
  • NextGen Connect (Mirth) — Healthcare integration engine.
  • ERPNext — Open source ERP (Quality Management, Manufacturing).

Verify — Observability & Validation

  • OpenObserve — Full-stack observability (logs, metrics, traces).
  • OpenSearch — Search and analytics suite.
  • Grafana — The open observability platform.
  • Prometheus — Monitoring system and time series database.
  • Jaeger — Distributed tracing.
  • restic — Fast, secure, efficient backups.
  • Velero — Backup and migrate Kubernetes resources.

Verify — Security Validation

Prove — Integrity & Provenance

  • in-toto — Framework to secure the integrity of software supply chains.
  • Sigstore — Signing and verifying software artifacts.
  • Trillian — Transparent, highly scalable and verifiable data store.
  • OpenLineage — Open standard for data lineage.
  • Marquez — Lineage metadata collection and visualization.

About

Trust nothing. Prove everything. An open-source trust assurance stack for regulated industries (Healthcare, Defense, Manufacturing)

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors