Transio: Cloud‑Native Security Showcase¶
End‑to‑end encrypted secrets with one‑time, self‑destructing links
Transio is a production‑grade app for sharing sensitive text without leaving a forensic trail. Users create encrypted notes, get a single‑use URL, and—boom—once it’s viewed, the secret is wiped forever.
This project is a live demo of cloud‑native security best practices and defense‑in‑depth on Azure Kubernetes Service (AKS).
✨ Key Features¶
🔐 End‑to‑End Encryption
True E2EE: secrets are encrypted in the browser with a key derived from the user’s passphrase. No passphrase? Data still rests under a Fernet key stored in Azure Key Vault—never in code.
🔗 One‑Time Links
Each link works exactly once. After retrieval, the record is securely deleted.
💥 Auto‑Destruct
Unopened secrets expire after a TTL you set; opened secrets vanish instantly.
🛡️ Hardened Infrastructure
AKS with RBAC, network policies, workload identity, and locked‑down pipelines.
🔍 Health Monitoring
Ready / live probes and a /healthz
endpoint for zero‑downtime rollouts.
🧪 Battle‑Tested
85 % code coverage, 99 green tests, OWASP Top 10 checks baked in.
🚀 Quick Start¶
Prerequisites¶
- Azure subscription (Owner / Contributor on target RG)
- Docker + kubectl + Helm 3
- Azure CLI & Bicep
1. AKS Deployment¶
# Prereqs: Azure CLI, kubectl, Helm
git clone https://github.com/tiagonunes1491/Transio-Secrets.git
cd Transio
./scripts/build_k8s.sh # Provision infra & deploy to AKS
2. Serverless Deployment (SWA + Container Apps)¶
# Prereq: Azure CLI
git clone https://github.com/tiagonunes1491/Transio-Secrets.git
cd Transio
./scripts/build_swa-aca.sh # Deploy front‑end to SWA, back‑end to Container Apps
Local Development¶
# Start all services with Docker Compose
cd deploy/compose
docker-compose up -d
# View logs (optional)
docker-compose logs -f
# Stop services when done
docker-compose down
🎬 Demo Workflow¶
- Create Secret – write your message (optional passphrase).
- Generate Link – get a unique one‑time URL.
- Share – send it via your weapon of choice (Slack, smoke signal, etc.).
- View & Vaporise – recipient reads it; Transio erases it.
🎯 Project Goals¶
- Prove Security Chops – real‑world cloud security in a live AKS cluster.
- Production‑Ready – multi‑container app with enterprise controls.
- Best Practices – defense‑in‑depth, IaC, and identity‑first design.
- Portfolio Magnet – show why I’m the Cloud Security Engineer you need.
🛠️ Tech Stack¶
Layer | Technology | Why |
---|---|---|
Frontend | HTML / JS / CSS + Nginx | Lightweight, hardened container |
Backend | Python (Flask) | Encryption API & secret logic |
DB | Cosmos DB | NoSQL with TTL + global replicas |
Orchestration | AKS | Secure, scalable containers |
Secrets | Azure Key Vault | HSM‑backed key storage |
Registry | Azure Container Registry | Image scanning & CI/CD hooks |
Ingress | App Gateway + AGIC | L7 WAF & TLS termination |
Identity | Azure Workload Identity | Pod‑managed, key‑less auth |
🚀 Next Steps¶
Built by Tiago Nunes – Cloud Security Engineer