Flowtriq Compliance Brief
Overview
Flowtriq is a real-time DDoS detection and mitigation platform deployed as a lightweight Linux agent on each monitored server. This document describes how Flowtriq's capabilities map to specific compliance requirements across SOC 2 Type II, PCI-DSS 4.0, and HIPAA. It is intended for security teams, auditors, and compliance officers evaluating Flowtriq as part of their infrastructure security controls.
Flowtriq provides: sub-second attack detection with dynamic baselines, automated classification of seven attack families, pre-attack PCAP forensics with a continuous ring buffer, automated mitigation across 46 rule types, 4-level BGP auto-escalation (FlowSpec, RTBH, cloud scrubbing), tamper-evident SHA-256 hash-chained audit logging, role-based access control, and 12+ alert channel integrations.
SOC 2 Type II
SOC 2 Type II audits evaluate the operating effectiveness of controls over a period of time. The following table maps Flowtriq capabilities to relevant SOC 2 Trust Service Criteria.
| Criteria | Requirement | Flowtriq Capability |
|---|---|---|
| CC6.1 | Logical access security over infrastructure | Role-based access control (Owner, Admin, Readonly). API key authentication with rotation. Session management with secure cookies (HttpOnly, SameSite, Secure). |
| CC6.6 | Monitoring of system boundaries | Per-second traffic monitoring at the kernel level. Native sFlow/NetFlow/IPFIX ingestion from border routers. Protocol breakdown (TCP/UDP/ICMP) with dynamic baseline comparison. |
| CC7.1 | Detection of unauthorized or anomalous activity | Dynamic EWMA baselines detect deviations from normal traffic patterns. Seven attack families auto-classified with confidence scoring. IP spoofing detection via TTL analysis. Botnet detection (300+ distinct source IPs). |
| CC7.2 | Monitoring for indicators of compromise | Five threat intelligence feeds (CISA KEV, Emerging Threats, URLhaus, CERT.PL, Trickest CVE PoC). 38 IOC patterns covering CVE exploit signatures and network protocol exploits. Source IP correlation against known compromised hosts. |
| CC7.3 | Response to identified security incidents | Automated 4-level mitigation escalation: local firewall rules, BGP FlowSpec, RTBH blackholing, cloud scrubbing. 46 auto-mitigation actions. Automated rollback on collateral detection. Alerts via 12+ channels within 1 second of detection. |
| CC7.4 | Incident response communication | Real-time alerts to Discord, Slack, PagerDuty, OpsGenie, Teams, Telegram, email, SMS, and signed webhooks. Severity-based escalation policies. Public status pages for customer-facing communication. |
| CC8.1 | Change management | Hash-chained audit log records every configuration change, mitigation action, and user activity. Each log entry contains SHA-256 hash of previous entry for tamper detection. |
PCI-DSS 4.0
PCI-DSS 4.0 requires organizations handling cardholder data to implement network monitoring, intrusion detection, and incident response controls. Flowtriq addresses the following requirements.
| Requirement | Description | Flowtriq Capability |
|---|---|---|
| 6.4.1 | Protect public-facing web applications against attacks | Layer 7 HTTP flood detection via access log analysis. Auto-mitigation with Nginx/Apache rules, XDP/eBPF packet filtering, and upstream BGP FlowSpec. |
| 10.2 | Implement audit trails for system components | Every detection event, mitigation action, configuration change, and user login is recorded in the hash-chained audit log with timestamp, actor, action, and outcome. |
| 10.4.1 | Audit logs are reviewed at least daily | Dashboard provides real-time audit log viewer with filtering by event type, user, node, and time range. Scheduled daily digest emails available via alert channels. |
| 10.7 | Retain audit trail history for at least 12 months | Audit log entries are stored in the database with no automatic expiry. Exportable for long-term archival in external systems. |
| 11.4 | Intrusion detection/prevention to monitor network traffic | Per-second packet-level monitoring on every node. Native flow ingestion from border routers. Attack detection in under 1 second with automatic classification. PCAP capture for forensic analysis. |
| 11.5 | Deploy change-detection mechanisms | Dynamic baselines detect changes in traffic patterns. Protocol ratio monitoring identifies unexpected traffic shifts. Configuration change audit logging with hash-chain integrity. |
| 12.10 | Implement an incident response plan | Automated incident lifecycle: detection, classification, severity assignment, alert dispatch, mitigation escalation, resolution, and post-incident PCAP export. Complete timestamped audit trail for each incident. |
HIPAA
HIPAA's Security Rule requires covered entities and business associates to implement safeguards to protect electronic protected health information (ePHI). Flowtriq addresses infrastructure-level security controls in the Technical Safeguards and Administrative Safeguards categories.
| Safeguard | Specification | Flowtriq Capability |
|---|---|---|
| 164.312(a)(1) | Access control: unique user identification, automatic logoff | Per-user accounts with role-based permissions (Owner, Admin, Readonly). Session timeout and secure cookie management. API key authentication with per-key scoping. |
| 164.312(b) | Audit controls: record and examine activity | Hash-chained audit log captures all system activity. Tamper-evident SHA-256 chain allows post-hoc verification. Filterable by user, event type, node, and time range. |
| 164.312(c)(1) | Integrity: protect ePHI from improper alteration | Audit log integrity guaranteed by SHA-256 hash chain. Any modification breaks the chain and is detectable. PCAP captures are checksummed at creation. |
| 164.312(e)(1) | Transmission security: guard against unauthorized access during transmission | All dashboard and API communication over TLS (HSTS enforced). Agent-to-platform communication encrypted. Webhook notifications support HMAC signing for authenticity verification. |
| 164.308(a)(6) | Security incident procedures: identify and respond to incidents | Automated incident detection, classification, and response. Sub-second detection latency. 4-level auto-escalation through firewall, FlowSpec, RTBH, and cloud scrubbing. Complete incident timeline with PCAP evidence. |
| 164.308(a)(5) | Security awareness and training | Dashboard provides real-time visibility into attack patterns, traffic anomalies, and threat intelligence. Incident reports include AI-generated summaries explaining attack type, impact, and mitigation actions taken. |
Audit-Ready Evidence
Flowtriq generates the following evidence artifacts that can be provided directly to auditors:
| Artifact | Description | Frameworks |
|---|---|---|
| Audit Log Export | Complete hash-chained log of all detection events, mitigation actions, configuration changes, and user activity. Exportable as CSV or JSON. Chain integrity verifiable offline. | SOC 2PCIHIPAA |
| Incident Timeline | Per-incident chronological record: detection timestamp, classification, severity, alert dispatch, mitigation actions, escalation decisions, and resolution. Includes peak PPS/BPS, attack family, confidence score, and source IP analysis. | SOC 2PCIHIPAA |
| PCAP Captures | Packet-level forensic evidence captured from a pre-attack ring buffer. Contains traffic from before, during, and after the incident. Downloadable per-incident for offline analysis in Wireshark or tshark. | PCISOC 2 |
| BGP Mitigation Log | Record of every BGP announcement and withdrawal: FlowSpec rules, RTBH routes, adapter used, payload sent, response received, TTL, and automatic rollback events. | SOC 2PCI |
| User Activity Log | Login/logout events, role changes, API key creation/rotation, configuration modifications, and manual mitigation actions with actor identification. | SOC 2HIPAA |