Rogue workload
Malicious or compromised service inside a cluster attempting lateral movement or credential abuse.
// Security
The honest question for a workload trust system is not "is it secure?" It is which attacker paths the system closes, which it constrains, which it makes attributable, and which it acknowledges remain. This page sets out QHx's threat model directly — including the residual risks.
001 · Objectives and non-goals
A security model that does not name what it is not responsible for is not a security model. It is a sales claim.
QHx's design center is workload identity, identity-bound communication, and durable provenance. It does not replace host hardening, supply-chain integrity, organizational identity governance, or application-layer security.
002 · Adversary model
These are not hypothetical. They are the attacker classes operationally present in distributed, multi-tenant, and coalition environments. QHx is designed against this set deliberately.
Malicious or compromised service inside a cluster attempting lateral movement or credential abuse.
Host or hypervisor compromise enabling credential extraction, workload spoofing, or attestation manipulation.
Over-privileged or adversarially controlled administrator abusing legitimate access paths.
On-path attacker capable of interception, downgrade attempts, replay, or traffic manipulation.
Compromise introduced through the build, release, or distribution pipeline before deployment.
Trust confusion across federated domains, coalition boundaries, or stale trust data in degraded operations.
Forward-looking adversary harvesting encrypted traffic now for decryption once quantum capability matures.
003 · Threat matrix
Every row is a concrete scenario. The middle column names what only QHx can do. The right columns name what QHx alone cannot finish.
| Threat | Primary QHx mitigation | Compensating control required | Residual risk |
|---|---|---|---|
| Workload impersonation | Cryptographic SVID identity, attestation-gated issuance | Secure boot, host hardening, image signing | A compromised node can impersonate workloads running on it. |
| Unauthorized credential issuance | Node attestation precedes workload attestation; selectors enforced | Protected PKI material, RBAC on Manager | PKI compromise or insider with issuance authority. |
| East-west interception | Mutually authenticated mTLS bound to identity | Segmentation, DNS hygiene, monitoring | Application-layer vulnerabilities above the tunnel. |
| Replay and credential reuse | Short-lived SVIDs, certificate-bound identity, rotation | Time synchronization, rate limiting | Replay within the short validity window if clock drift exists. |
| Unauthorized lateral movement | Identity-aware policy, namespace-scoped authorization | Network segmentation, RBAC | Misconfigured policy permitting overbroad access. |
| Policy tampering | Trust-domain boundaries, federation controls, attested issuance | Datastore integrity, access control on policy engine | Insider with legitimate policy authority. |
| Supply-chain compromise | Attested build path, notarization where applied | Artifact signing, secure CI/CD, integrity checks | Compromise prior to attestation or notarization point. |
| Operator abuse | Separation of duties across Manager, PKI, Notary, Policy | PAM, access logging, review workflows | Collusion, or a single operator with unconstrained authority. |
| Repudiation of handling | Notarization of request and response, signed receipts | Log retention, forensic pipeline | Notarization not applied universally to all workloads. |
| Harvest-now-decrypt-later | Post-quantum mTLS path (ML-DSA, ML-KEM, hybrid) | Migration of remaining endpoints to PQ | Endpoints not yet migrated retain classical-only exposure. |
004 · Identity and attestation
Residual: full host compromise allows an attacker to extract and reuse credentials for the window before revocation. QHx does not claim to defend assets inside a compromised trust boundary.
005 · Communication and traffic
An encrypted channel without verified endpoints is an encrypted channel to anywhere. QHx makes peer identity a precondition for the channel rather than a property optionally checked above it.
006 · Control plane, federation, supply chain
Deployed in isolation, the control-plane trust assumptions become the primary attack surface. The list below is what QHx contributes and what must come from elsewhere.
007 · Residual risks
These are operational realities, not design failures. A complete security model names them.
A compromised node grants access to credentials of workloads running on it. QHx cannot defend assets inside a fully compromised trust boundary.
Compromise of the PKI root, HSM, or attestation root collapses the issuance model. This is a dependency, not something QHx resolves internally.
Operators with access to the policy engine, Manager, or PKI can abuse it. Separation of duties reduces this surface; it does not eliminate it.
Without TPM, measured boot, or equivalent, attestation quality drops. Issuance assurance degrades accordingly.
Cross-domain trust scoped incorrectly can accept foreign credentials. QHx provides the controls; correct use requires disciplined configuration management.
Disconnected nodes may apply expired policy or stale trust bundles. Freshness cannot be forced without connectivity to the control plane.
Code above the transport remains outside QHx’s scope and must be addressed through other controls.
Malicious artifacts introduced before QHx’s attestation or notarization point are not retrospectively detectable by QHx.
// Security
QHx is one disciplined layer in a larger security architecture. Its effectiveness depends on the quality of the environment it is deployed into and the rigor of the controls that surround it.
Talk to us