Member Onboarding
Set up your encryption credentials. Your password never leaves your browser.
—
Escrow Policy
—
Onboarding Complete
Your encryption key has been derived and cached in your browser. You won't need your password again until offboarding.
Encryption Dashboard
Test your encryption key and verify it's working correctly.
No Active Session
Complete onboarding first to activate your encryption key.
Member Offboarding
Securely destroy your encryption credentials and complete departure.
No Active Session
You need an active session to offboard. Complete onboarding if you haven't already.
How We Keep You Safe
Transparency about our encryption architecture — what we protect and how.
Your Password, Your Key
When you onboard, your password is used to derive a unique encryption key through a computationally intensive process (hundreds of thousands of iterations). This happens entirely in your browser — your password is never transmitted, stored on any server, or seen by anyone at CASI.
Military-Grade Encryption
Your data is encrypted with AES-256-GCM, the same standard used by governments and financial institutions worldwide. Each piece of data gets a unique initialization vector, ensuring that identical inputs produce different encrypted outputs.
Zero-Knowledge Architecture
Our servers never have access to your encryption key or your unencrypted data. We can store and deliver your encrypted data, but we cannot read it. Only someone with your derived key can decrypt your information.
Network-Level Protection
This portal is accessible only through our private network overlay. Every connection is authenticated before it reaches our servers. Unauthorized devices simply cannot see or interact with our infrastructure.
Backup Key Escrow
During onboarding, you receive a backup key. For internal members, this is securely stored in our enterprise password vault. For external partners, you maintain custody of your own backup. This ensures recoverability without compromising security.
Emergency Response
If a security incident occurs, administrators can immediately revoke network access, cutting off all connections to CASI infrastructure within seconds. This multi-layered approach ensures rapid response to any threat.
⚠️ Emergency Deactivation
Administrator-only. Immediately revoke a member's access to all CASI systems.
Escalation Levels
Remove from Tailscale ACL
Remove the user's email from group:casi-members in the Tailscale admin console. Immediately
cuts
off all SSH, HTTPS, and service access to CASI resources.
- Open Tailscale Admin Console → Access Controls
- Find
"group:casi-members"in the ACL policy - Remove the user's email address
- Save the policy
Remove Tailscale Device
Delete the user's device from the Tailscale machine list. The device can no longer connect to the tailnet.
- Open Tailscale Admin Console → Machines
- Find the user's device(s)
- Click Remove
Rotate Deployment Salt
Changes the server-side salt used in password-based key derivation. Invalidates all password-derived keys across the organization.
- Generate a new deployment salt
- Update the environment variable on the target service
- Restart the service
- All members must re-onboard
Delete PBS Encryption Key
Remove the backup encryption keyfile from Bitwarden and the Proxmox host. Backups become permanently unrecoverable.
- Delete
PBS-Encryption-Keyfrom Bitwarden vault - Delete
/etc/pve/priv/storage/pbs-art-backup.keyfileon ART-Infra1 - Future backups will fail — reconfigure with a new key