Security Controls
Security Controls — Token Fabric
OAuth2/OIDC broker with step-up MFA hooks for legacy session bridges.
Issue least-privilege tokens mapped to legacy user profiles, with anomaly scoring on token exchange paths and hardware-backed signing options.
8-week hardening sprint · Subscription · Hybrid HSM
₩4,100,000
Informational monthly or program fee before taxes; contracts may differ.
Capabilities
- Profile bridge maps with scheduled recertification
- Step-up challenges for high-risk verbs
- Hardware security module integration patterns
- Delegated admin with dual control
- Token introspection caching tuned for mainframe latency
- SIEM-friendly export schemas
Outcomes we document together
- Centralized evidence for access reviews
- Reduced long-lived service accounts
- Clear separation between human and batch principals
Responsible lead
Sora Kim
Security Analyst covering financial services API exposure.
FAQ
Field notes
“Step-up flows finally match how risk talks about material payments.”
“SIEM exports required one mapping tweak; support shipped a patch in two days.”