Security first.
Not eventually.
Every architectural decision in Cluster1 has a security reason. Post-quantum encryption, zero-trust networking, PII filtering. None of it was added later. All of it was designed in.
The harvest is already happening.
Encrypted traffic captured today will be readable the moment a sufficiently powerful quantum computer exists. That timeline sits somewhere between 5 and 15 years, but it's irrelevant because the data being captured now will still be valuable then. Cluster1's lvls vault uses ML-KEM-768 (NIST FIPS 203) for all credential encryption. Not because it's a buzzword. Because the threat is active and classical asymmetric keys have a horizon.
No ports. No VPN config. No public surface.
The Cluster1 admin interface is not on the internet. It's not behind a firewall with open ports. All operator access goes through Tailscale: mutual authentication, device trust, no configuration required. If an attacker scans your IP range, they find nothing. That's the point.
Your data stops here. The prompt continues clean.
Every LLM call from a ClawOps agent goes through the Privacy Proxy before it hits any model endpoint. The proxy runs named entity recognition, regex pattern matching, and custom rules, stripping names, emails, API keys, JWTs, phone numbers, whatever you configure. The model never sees the raw data. Your data never leaves your infrastructure as-is.
ISO 27001 & ISO 42001 — built in, not bolted on.
Cluster1 is designed to be ISO 27001 (Information Security Management) and ISO 42001 (AI Management Systems) compliant from the ground up. Every control — audit trails, approval gates, agent scoping, access boundaries — maps to a specific requirement before the first line of code ships. Compliance is structural, not retrospective. Security posture is tracked continuously against the NIST Cybersecurity Framework, giving operators a live view of Identify, Protect, Detect, Respond, and Recover across the cluster.
Secure by design.
Auditable by default.
Security is not a layer added on top of Cluster1. It's built into the architecture. Every component enforces compliance posture without additional configuration.