SECURITY

Zero-Trust Architecture

A security model that requires strict identity verification for every person and device attempting to access resources, regardless of their network location.

BasaltHQ operates on the principle of "never trust, always verify." Every API call between modules—whether from BASALTCRM to BASALTERP, or from an edge kiosk to the cloud—is authenticated with short-lived, scoped JWT tokens. There is no concept of a "trusted internal network." Even if an attacker breaches the perimeter, they cannot move laterally because every micro-service independently validates the caller's identity and permissions. This architecture is mandatory for SOC2 Type II compliance and is enforced by BASALTONYX's continuous compliance monitoring engine.