AnkaSecure Documentation Portal
Welcome to the internal documentation hub for AnkaSecure, AnkaTech's next-generation Post-Quantum Cryptography platform. This portal is structured to guide each team member to the content most relevant to their role and responsibilities.
Quick Start
New to AnkaSecure? Start here:
| Document | Description |
|---|---|
| Key Concepts | Core terminology and concepts |
| Platform Overview | Complete capabilities and architecture |
| Deployment Organization Model | UPDATED - How to organize deployments, tenants, applications, and keys (canonical) |
| Conceptual Architecture | 5 Pillars framework for Crypto Agility Orchestration |
| Quick Start Guide | Installation and first environment |
| System Requirements | Hardware and software prerequisites |
| Team Onboarding Plan | Structured learning path for new team members |
By Role
For Solution Architects
Design and architecture artifacts for system components, data flows, security controls, and deployment topologies:
Organization & Governance:
- Deployment Organization Model - UPDATED - Practical guide for organizing deployments with decision frameworks (canonical)
- Conceptual Architecture - 5 Pillars framework for Crypto Agility Orchestration
- Enterprise Implementation Playbook - NEW - Step-by-step implementation guide
Architecture:
- Conceptual Architecture - High-level system design
- Platform Architecture - Infrastructure and deployment topology
- Component Overview - Service interactions and dependencies
- Composite Keys Architecture - Hybrid cryptography (NIST CSWP 39)
Technical Deep Dives:
- Core API Architecture - Core API design
- Cryptographic Lifecycle - Key management flow
- Redis Architecture - Caching and session infrastructure
- Kafka Event Architecture - Event streaming and audit trail
- Edge NGINX Architecture - Multi-tenant routing
For Developers & Engineers
Reference materials, API specifications, code samples, and implementation guides:
API & SDK Development:
- Core API Reference - REST API endpoints
- Composite Hybrid Keys API - Quantum-resistant encryption/signing
- Audit API Reference - Audit trail queries
- SDK Usage Guide - Software development kit
- SDK Flow 29: Composite Keys - Hybrid crypto code example
- CLI Commands - Command-line interface
- Streaming Operations - Bulk crypto operations
Migration & Interoperability:
- Migration Overview - Strategy and planning
- PKCS#7 to JOSE Conversion - Legacy format migration
- RSA to ML-KEM Workflow - Encryption algorithm migration
- RSA to ML-DSA Workflow - Signature algorithm migration
Performance & Testing:
- Performance & Scalability - Optimization guides
- Benchmark Results - Complete performance data
For DevOps & Operations
Operational runbooks, automation scripts, environment management, and deployment workflows:
Deployment Planning:
- Enterprise Implementation Playbook - NEW - Complete implementation guide
- Deployment Models - SaaS/Enterprise/Private Cloud model selection
- Sizing & Capacity Planning - Resource requirements
Daily Operations:
- Operate Environment - Daily operations with envctl.sh
- Troubleshooting Guide - Problem resolution
- Health Checks - Service monitoring
Deployment & Environment Management:
- Installation Overview - Complete installation guide
- Deploy Environment - Installation procedures
- Backup & Restore - Data protection
- Certificate Management - TLS certificate rotation
- KEK Rotation - HSM key rotation
Build & Release Management:
- Release Overview - Release process
- Upload Docker Images - Build and deploy services
- Build SDK - SDK release process
- Build CLI Suite - CLI build procedures
Automation & CI/CD:
- CI/CD Pipeline - Continuous deployment
- Script Reference - Automation scripts
For Security & Compliance Officers
Policies, key management controls, certification evidence, and compliance frameworks:
Key Management:
- Key Management Overview - Key lifecycle
- Composite Hybrid Keys - Quantum-resistant keys (HNDR protection)
- Composite Keys Best Practices - Usage guide
- Policy System Design - Policy framework
Compliance & Certifications:
- NIST CSWP 39 Compliance - Hybrid algorithm certification
- GSA PQC Compliance - Federal contract readiness
- ETSI QSC Compliance - EU telecommunications
- OWASP Compliance - Security standards
- FIPS 140-3 & Algorithms - Cryptographic compliance
- Regulatory Compliance Matrix - Complete compliance map
HSM & Infrastructure Security:
- HSM Integration Guide - Hardware security modules
- Security Architecture Overview - Security audit
- Core API Security - Authentication implementation
Audit & Monitoring:
- Audit API Overview - Audit trail system
- Audit Query Patterns - Common queries
- Credentials Reference - Default users and policies
For Sales Teams
Sales enablement materials, competitive positioning, and customer conversations:
Seller Enablement Kit (16 documents):
- Overview & Usage Guide - How to use the kit
- Quantum Threat Overview - The problem we solve
- Platform Overview - What AnkaSecure does
- Elevator Pitch - 30-second pitch
- Target Clients & Pain Points - Ideal customer profile
- Client Conversation Guide - Discovery questions
- Five Pillars Selling Guide - Value proposition
- Use Cases by Industry - Vertical focus
- Competitive Positioning - vs competitors
- Objection Handling - Common objections
- Value Propositions & ROI - Business case
- Compliance & Regulatory - Compliance selling
- Pricing & Licensing - Commercial models
Qualification Tools:
- Pre-Sales Technical Assessment - Technical qualification
- Quick Lead Qualification - Lead scoring
Presentations:
- Executive Pitch (12 slides) - C-level presentation
- Technical Deep Dive (38 slides) - Technical audience
- Federal Compliance Brief (18 slides) - Government sector
For Product & Marketing
Strategic context, messaging guidelines, and market-facing collateral:
- Use Cases & Stories - Real-world applications
- Cryptographic Sovereignty - Sovereign crypto
- Crypto-Agility (Executive) - Business case
- Composite Keys Market Advantage - Competitive edge
- Strategic Articles - Market timing
- Global PQC Status - Market landscape
- Strategic Canvas - Business strategy
For Leadership
Business-oriented analyses and strategic roadmaps:
- Performance Benchmarks - Complete benchmark data
- Scalability Analysis - System capacity
- Global Coverage Roadmap - Product roadmap
- HSM Pricing Analysis - Cost analysis
Common Tasks
Quick access to frequent workflows:
Getting Started:
- Deploy First Environment - Step-by-step installation
- Validate Installation - Post-deployment checks
Daily Operations:
- Start/Stop Services - Environment control
- Check Service Health - Monitor system status
- View Logs - Debug issues
Migration Workflows:
- Migrate PKCS#7 to JOSE - Legacy format conversion
- Migrate RSA to PQC - Complete enterprise migration
- Validate Migration - Ensure successful transition
Build & Release:
- Build and Deploy Services - Docker image workflow
- Release SDK - SDK build process
- Release CLI Tools - CLI build process
Troubleshooting:
- Troubleshooting Decision Trees - Systematic problem resolution
- Common Issues - Known problems and fixes
- Emergency Procedures - Critical incident response
Quick Reference
Fast lookups for commands, errors, and configuration:
Commands & Scripts:
- All Commands Reference - Complete command catalog
- Script Exit Codes - Return code meanings
- Diagnostic Commands - Debug commands
Configuration:
- Port Matrix - Service port assignments
- Directory Structure - File system layout
- Environment Variables - Configuration reference
- Configuration Files - Config file locations
Errors & Troubleshooting:
- Error Catalog - Error code lookup
- Algorithm Catalog - Simple algorithms (84 total)
- Composite Algorithms - Composite algorithms (41 combinations)
- Policy Templates - Policy templates (23 total)
Documentation Categories
Complete documentation organized by topic:
1. Getting Started
Entry point for new users - onboarding, concepts, and quick starts. Browse Getting Started →
2. Foundational Concepts
Core concepts that underpin the platform - JOSE, hybrid keys, crypto-agility, tenant isolation. Browse Foundational Concepts →
3. Architecture
System design, components, and technical architecture. Browse Architecture →
4. Components
Deep dive into each service: Core API, Admin API, Auth API, Audit API, License Server, CLI, SDK. Browse Components →
5. Migration & Interoperability
Legacy system migration, PKCS#7 conversion, RSA-to-PQC workflows. Browse Migration →
6. Security & Compliance
Key management, HSM integration, compliance reports, security policies, algorithms (125 total). Browse Security → | HSM Integration →
7. Deployment
Deployment models (SaaS, Enterprise, Hybrid), planning, and installation. Browse Deployment →
8. Operations
Day-to-day operations, maintenance, runbooks, troubleshooting. Browse Operations →
9. Infrastructure
Supporting services: monitoring, OpenTelemetry, external integrations, CI/CD. Browse Infrastructure →
10. Performance
Benchmarks (compact & streaming), scalability, optimization guides. Browse Performance →
11. Reference
Commands, errors, configuration, ports, directory structure. Browse Reference →
12. Use Cases
Real-world applications, customer scenarios, business questions. Browse Use Cases →
13. Articles & Insights
Strategic insights, technical deep-dives, market analysis. Browse Articles →
14. Sales & Marketing
Seller enablement, presentations, qualification tools. Browse Sales & Marketing →
15. Advanced Topics
Implementation plans, streaming architecture, technical notes. Browse Advanced →
16. Development & Release
Build procedures, Docker images, SDK/CLI releases, GPG setup. Browse Development →
What's New
Recent documentation updates:
| Date | Change |
|---|---|
| March 2026 | Restructured documentation - consolidated Deployment Organization Model as canonical source for hierarchy and governance |
| March 2026 | Added Enterprise Implementation Playbook - Step-by-step implementation guide |
| March 2026 | Updated Conceptual Architecture - 5 Pillars framework for Crypto Agility Orchestration |
| March 2026 | Consolidated Deployment Models - SaaS/Enterprise/Private Cloud |
| March 2026 | Expanded algorithm catalog to 125 algorithms (84 simple + 41 composite) |
Last updated: March 2026 Documentation version: 4.1.0