Security Model
NØNOS implements defense-in-depth with multiple security layers.
Security Layers
┌───────────────────────────────────────┐
│ Layer 5: Application Sandboxing │
├───────────────────────────────────────┤
│ Layer 4: Capability-Based Access │
├───────────────────────────────────────┤
│ Layer 3: Memory Protection │
├───────────────────────────────────────┤
│ Layer 2: Kernel Verification │
├───────────────────────────────────────┤
│ Layer 1: Boot Chain Verification │
└───────────────────────────────────────┘Chain of Trust
Boot Verification
Signature Verification
Capability System
What are Capabilities?
Permission Types
Permission
Description
Usage
Memory Protection
W^X Policy
W^X PolicyAddress Space Isolation
Address Space IsolationKASLR
KASLRHardware Security
Supported Features
Feature
Purpose
CPU Mitigations
Cryptographic Security
Algorithms
Use
Algorithm
Security Level
Key Storage
Zero-Knowledge Proofs
Attack Surface
Minimized Codebase
Component
Size
Unsafe Code Audit
Security Guarantees
Incident Response
Last updated
Was this helpful?


