Every action audited. Every automation bounded. Your infrastructure, under control.
Trust Pillars
How It Works
The Difference
Transparency
We don’t have SOC2 yet. We’re a small operation building toward it. Here’s what we do have today:
Network security — All management traffic runs over Tailscale’s WireGuard mesh. No management ports on the public internet. Zero open inbound ports for our access.
Host hardening — SSH key-only authentication, fail2ban, automatic security patches, least-privilege containers. Every managed host, every tier.
Encrypted backups — AES-256 encryption via Restic before data leaves the host. SFTP for transit. Verified daily.
Infrastructure as code — Every configuration lives in Git. No manual changes to production. Full audit trail of every change. If a host dies, we rebuild it from the repo.
Access isolation — Per-client SSH keys. Per-client environments. Credentials in Ansible Vault. Your infrastructure is never shared with another client.
The self-healing pipeline is continuously tested against real infrastructure scenarios across 6 severity tiers. The Ansible collection that powers all of it is open source — inspect it yourself at github.com/opskern/ops-kernel-stack.