Design Transparency

We believe security comes from sound design, not obscurity. Explore our architecture, trust models, and design decisions in detail.

Design Principles

The core principles that guide every architectural decision in EyeLog.

01

Defense in Depth

Multiple independent layers of security. Compromise of one layer doesn't compromise the system. mTLS + Signing + Human Approval.

02

Local Authority

The agent is authoritative on the endpoint. Central infrastructure cannot override local admin decisions without consent.

03

Explicit Over Implicit

Every capability must be explicitly enabled. No default-on behavior. If it's not in the manifest, it's not allowed.

04

Separation of Concerns

Control plane separate from data plane. Each protocol optimized for its purpose. Clear boundaries between components.

05

Graceful Degradation

System continues to function when components fail. Offline agents use cached capabilities. No single point of failure.

06

Auditability

Every command, state change, and capability decision is logged. Full trace of who did what, when, and why.

Quick Reference

Key concepts at a glance.

Channels

gRPC :9443 Control plane (bidirectional)
QUIC :5514 Data plane (agent → collector)

Agent States

READY Accepts any command
DEPLOYING Installing software
UPDATING Self-update in progress
MAINTENANCE Maintenance mode

Manifest Templates

monitor-only Read-only visibility
standard Balanced monitoring
managed Full IT control
lockdown Security-focused

Security Layers

Layer 1 mTLS (transport)
Layer 2 Manifest signing (content)
Layer 3 Local admin approval (human)