Skip to content

Data Flow Security Model

Huzefaaa2 edited this page Jan 26, 2026 · 1 revision

Data-Flow Security Model

This model highlights where PII is scrubbed and what data leaves the cluster.

PII scrubbing points

Stage Location Output
Pre-ingest PII Guardrail Redacted telemetry
Post-ingest SLO Copilot Derived metrics only
RCA output T-RAG Summary-only RCA

Data leaving the cluster

  • Redacted telemetry streams
  • Derived SLO metrics and burn rates
  • Sampling policies and guardrail snippets
  • RCA summaries and topology hints

Reference flow

flowchart LR
  subgraph Cluster
    Workloads --> OTEL[OTEL Collectors]
    OTEL --> PII[PII Guardrail]
    PII --> CAAT[CAAT Sampling]
    OTEL --> SLO[SLO Copilot]
    OTEL --> TOP[Topology RCA]
    OTEL --> TRAG[T-RAG RCA]
  end

  subgraph ControlPlane
    API[MindOps Control Plane]
    Store[(Policies + SLO Store)]
    API <---> Store
  end

  subgraph External
    OBS[Observability Backends]
    SIEM[SIEM / Ticketing]
  end

  PII --> OBS
  SLO --> API
  CAAT --> API
  TRAG --> API
  TOP --> API
  API --> SIEM
Loading

Clone this wiki locally