Both MCP Fortress and PAT Fortress are built on the same security-first architecture. Credentials are never logged, never returned in API responses, and only enter Serverless Function memory after all policy checks pass.
Choose how much you trust Kestra Labs with your keys. All three tiers apply to both MCP Fortress and PAT Fortress.
"Giving your house key to a trusted neighbor"
"Your key + our key required"
"Credentials never leave your building"
Credentials NEVER logged. Not in Monitoring, not in errors, not in audit. Serverless Function memory only.
Credentials NEVER returned in API responses. Admin API shows metadata only.
Key Management key policy restricts decrypt to the policy engine execution role only. No human user can decrypt.
PAT Fortress: Claude PAT is NEVER exposed to the end user. They authenticate with org API key + Entra ID. The real Claude PAT is internal.
All data in transit: TLS 1.2+. Redis: in-transit encryption. Managed Database: at-rest encryption.
API keys hashed (SHA-256) before storage. Shown once at creation, never again.
Zero Trust credential lifecycle: key enters memory → used → explicitly zeroed. No disk, no swap.
Device posture re-validated every 15 minutes (cache TTL). Compromised device = instant revocation.
PAT Fortress: full request/response logging stored in encrypted object storage with server-side encryption. Access restricted to audit roles only.
Private Network Flow Logs and CloudTrail enabled for all resources.
SOC 2 Type II is a Trust Services Criteria framework demonstrating controls over security, availability, and integrity of systems.
ISO 27001:2022 is the international standard for information security management systems (ISMS).
NIST 800-53 and Cybersecurity Framework 2.0 provide security controls and continuous monitoring guidance.
PCI DSS 4.0 applies when handling payment card data or integrating with payment systems.
GDPR applies to any processing of personal data of EU residents, including authentication data and audit logs.
HIPAA applies to healthcare providers and covered entities handling Protected Health Information (PHI).
What it takes to build this yourself vs. using our managed platform.
| Capability | DIY | Kestra Labs |
|---|---|---|
| Credential Storage | Build Key Management integration, key rotation, vault | Managed vault with three trust tiers |
| Identity & SSO | Integrate SSO provider yourself | Built-in SAML/OIDC federation |
| Device Posture | Build MDM provider integration | Zero Trust tier includes device checks |
| Policy Engine | Build RBAC from scratch | Visual Policy Radar, deny-by-default |
| Audit Logging | Build structured logging pipeline | Every request logged, exportable evidence |
| Claude API Governance | Nothing: raw API keys shared with developers | PAT Fortress: model allowlists, spend caps, full audit |
| PII Redaction | Build regex/NLP pipeline | Configurable per-role per-connector |
| Compliance Evidence | Manual spreadsheets for auditors | One-click SOC 2/ISO evidence export |
| Time to Production | 3-6 months | 5 minutes (SOHO) |
Click each question to see how a DIY approach compares to Kestra Labs, straight from a SOC 2 Type II auditor's playbook.