| Document | Audience | Description |
|---|---|---|
| Why Conduit | Decision-Makers, Architects | The case for on-premises infrastructure mesh |
| Guide | Operators, DevOps | End-to-end walkthrough: setup, register, monitor |
| Document | Audience | Description |
|---|---|---|
| Architecture | Developers, Auditors | Component model, data flow, trust boundaries |
| Security Evaluation | CISOs, Security Teams | Threat model, cryptographic guarantees, hardening |
| Crypto Notice | Security Engineers | Algorithm inventory, key management, post-quantum stance |
| Network Guide | Network Engineers | DNS, TLS trust, split-horizon, air-gap configuration |
| Document | Audience | Description |
|---|---|---|
| Commands | Operators | Reference for all 8 CLI scripts |
| Deployment | DevOps, SREs | Docker, air-gap, multi-server, and production deployment |
| API Reference | Developers | REST endpoints served by server.py |
| Document | Audience | Description |
|---|---|---|
| Admin UI | Developers, Operators | React SPA: URL routing, blank slate, views, testing, design system |
| Development | Contributors | Prerequisites, project structure, testing, code style |
| Document | Framework | Controls |
|---|---|---|
| Compliance Overview | All | Summary and methodology |
| HIPAA | HIPAA | Transmission security, access control, audit |
| CMMC 2.0 | CMMC | Network architecture, encrypted sessions, logging |
| FedRAMP | FedRAMP | Transmission confidentiality, key management |
| SOC 2 | SOC 2 | Logical access, network security, monitoring |
| ISO 27001 | ISO 27001 | Network security, web filtering, cryptography |