Workplace Conduct TrainingReal-time voice · STT → LLM → TTSworkplace.carecollaborative.cloud

Workplace Conduct Training Architecture

Trust & compliance

Security Architecture

Six-layer defense-in-depth architecture with enterprise-grade security controls. AI Governance provides an additional enforcement plane for LLM spend and policy compliance.

Layer 1 — Perimeter Security

Cloudflare DDoS Protection

Volumetric attack mitigation, rate limiting, geo-blocking at the edge

L7 Load Balancer

Cloudflare-managed L7 routing with TLS termination and WebSocket support

Edge Rules & Bot Protection

Custom WAF rules, bot detection, and IP reputation filtering

Layer 2 — Network Security

Tailnet WireGuard Mesh

Encrypted peer-to-peer networking between Runtime instances and workers

DERP Relay Servers

NAT traversal fallback relays for connectivity behind restrictive firewalls

Private Endpoints

Azure Private Link for database and storage — no public IP exposure

Layer 3 — Identity & Access

OAuth2 / OIDC / SAML SSO

Full SSO integration with Auth0, Azure AD, Okta, and custom OIDC providers

RBAC with OPA/Rego Policies

Fine-grained role-based access compiled to SQL for zero-overhead enforcement

Per-Org Temporal Isolation

Each organization gets a dedicated Temporal namespace for hard execution boundaries

Layer 4 — Data Protection

AES-256 Encryption at Rest

PostgreSQL Flexible Server with transparent data encryption, geo-redundant backups

TLS 1.3 In Transit

All inter-service communication encrypted. SRTP for WebRTC media streams

Key Vault (HSM-backed)

Azure Key Vault for TLS certificates and secrets with automatic rotation

Layer 5 — AI Governance & Application

AI Bridge Proxy (MITM)

Intercepts all LLM/AI calls for governance — budget caps, policy checks, usage logging

Per-Agent Budget Enforcement

Token and spend limits per agent, per org. OPA policies for content filtering

Container Hardening

Non-root runtime, minimal Alpine base, read-only filesystem, no shell in production

Layer 6 — Monitoring & Audit

Prometheus + OpenTelemetry

Real-time metrics collection and distributed tracing across all services

Immutable Audit Trail

Cryptographic audit chain — every action logged, tamper-evident, immutable retention

Health & Heartbeat Monitoring

Worker heartbeat detection, automatic failover, Temporal activity retries