ABS Core v2.0.3
Technical

Architecture Isolation

Boundary guarantees and data segregation.

Architectural Isolation and Boundary Guarantees

This document details how ABS Core guarantees data and execution segregation in multi-tenant and enterprise environments.


1. Cryptographic and Data Boundary

  • Tenant Isolation: In the Private Engine infrastructure, each client has a TenantID linked to exclusive encryption keys via Secret Vault JIT. Payloads from one tenant are never processed in the same memory context as another.
  • Data-at-rest: Logs in D1 are segregated by partition keys and encrypted locally before writing, ensuring that even unauthorized database access will not expose other clients' data.

2. Policy Isolation Layer (WASM)

  • Isolated Evaluation: Every policy check executed by the WASM Policy Engine runs within a strictly constrained linear memory space.
  • Control Flow Integrity: The engine ensures that governance rules cannot leak state between audits or access the host filesystem/network directly.

[!IMPORTANT] Boundary Note: In Gateway Mode (Proxy), the isolation is focused on the decision engine. The Gateway does not directly jail the agent's host runtime (Python/Node process). For scenarios requiring host-level sandbox guarantees, ABS Core must be deployed in Sentinel Sidecar Mode.

3. Enterprise Isolated Model (VPC)

For clients in the financial and defense sectors:

  • Dedicated Dispatcher: The buyer can choose to run the ABS Core engine inside their own VPC (AWS/GCP), using only the Central Control Plane as a signaling layer and keeping 100% of data boundaries under their direct control.

4. Data Flow & Latency Analysis

ABS Core is optimized for zero-latency impact on agent reasoning loops.

  • WASM Execution: Policy evaluation occurs at the edge. The Rust-based WASM runtime typically evaluates rules in < 2ms, ensuring total overhead (including I/O) remains < 5ms.
  • Shadow Auditing: Heavy operations, such as Ledger anchoring and telemetry analysis, occur on a shadow path. The agent never waits for the audit record to be persistent before receiving a policy decision.

Verdict: The architecture meets the segregation requirements demanded by banks and regulated institutions, removing the risk of cross-tenant contamination while maintaining high-performance execution.

On this page