DEC-LLC Whitepaper — April 2026

SDNS Architecture: Self-Sovereign Infrastructure

How the SDNS platform provides a single, self-sovereign authority for DNS, DHCP, identity, and security — independent of any cloud provider or external service.

← Back to DEC-LLC

The Problem: Fragmented Authority

Modern IT infrastructure is managed by dozens of independent systems. DNS is controlled by one provider. DHCP by another. Firewall rules live in one console. VPN configuration in another. Backup policies in a third. Monitoring in a fourth. Each system is its own authority, with its own credentials, its own audit trail, and its own failure modes.

When something goes wrong, the first question is always: who changed what, when, and where? In a fragmented environment, the answer requires checking five different dashboards, three different log formats, and two different vendors' support portals. By the time you've assembled the picture, the incident has escalated.

Cloud computing made this worse, not better. Now the same questions span on-premises infrastructure and one or more cloud providers, each with their own networking model, their own security primitives, and their own way of doing things.

The fundamental problem is not complexity. It is fragmented authority. No single system knows the complete truth about your infrastructure.

The SDNS Solution: One Cohesive Authority

SDNS — Software Defined Systems Networking and Storage — is the integrated behavior that emerges when multiple specialized DEC-LLC products share data, events, and AI-driven reasoning through a common databus. Each product is independently useful. Together, they create a coordinated view of infrastructure where networking, compute, security, and storage decisions are informed by the full picture — not fragments of it.

External Inputs (cloud-init, PXE, USB, console, API) | v SDNS Provisioning Engine <-- SINGLE AUTHORITY | +-- DNS (BIND9, own zones, own truth) +-- DHCP/IP (Kea, reservations under product control) +-- Firewall (nftables, stateful inspection, IPS) +-- VPN (WireGuard, OpenVPN, IPsec) +-- Monitoring (device discovery, health, SNMP, flow) +-- Backup (scheduled, verified, encrypted) +-- Identity (hostnames, certs, licenses, users) +-- AI (threat analysis, config assistance) | v Converged State (quorum across products)

The Products

ProductRoleWhat It Controls
OpenUTMSecurityFirewall, VPN, IPS, DNS filtering, content filtering, threat feeds. Secures on-prem, cloud, and hybrid — same image, same policies everywhere.
NIVMIAVisibility & ControlNetwork monitoring, fleet management, configuration standardization, and error correction. Manages customer-owned AND third-party vendor equipment. Detects and corrects misconfigurations (VLAN, BGP, OSPF), suppresses broadcast storms, enforces config baselines, plans bandwidth and QoS capacity, and implements changes across 17+ vendor platforms.
IVMIAComputeManages the entire compute estate — VMs across all hypervisors and clouds, plus physical workstations, laptops, POS terminals, and field devices. Resource allocation and redistribution, hardware compatibility checks, capacity planning, and workload placement optimization.
VaultSyncData IntegrityBackup, replication, and disaster recovery for VMs, physical servers, network configs, and mobile devices. Extracts business data from backups — contact directories, compliance artifacts, configuration history.

Each product can be deployed standalone and delivers immediate value. A customer can buy OpenUTM as a firewall and use nothing else. But when two or more products are deployed together, they share state, correlate events, and act as a unified authority.

Core Principle: External Provisioners Are Input Adapters

The SDNS platform accepts configuration input from many sources: cloud-init in a cloud environment, PXE for bare-metal provisioning, USB drives for air-gapped sites, a web-based setup wizard for interactive deployment, or an API for automation. These are all input adapters — mechanisms for delivering configuration data to the platform.

They are not the authority. The platform is the authority.

This distinction matters because it means the platform can operate, converge, and recover regardless of which input adapter was used to provision it. A firewall deployed via cloud-init on AWS and a firewall deployed via USB on a rack-mount appliance run the same software, enforce the same policies, and report to the same management plane.

What This Means in Practice

If a cloud provider changes their DHCP behavior, updates their metadata service, or modifies their networking model, the SDNS platform adapts at the input adapter layer. The core authority — DNS zones, firewall rules, VPN tunnels, backup policies — is unaffected. The customer's infrastructure continues to operate as defined, not as the cloud provider decided.

The Closed Loop

When all four products are deployed, they form a closed loop:

  1. OpenUTM controls what traffic enters and leaves the network. It enforces security policy at every boundary — on-premises, in the cloud, and across hybrid connections.
  2. NIVMIA sees and controls everything on the network. It discovers devices, monitors health, collects flow data, standardizes configurations, corrects errors (VLAN mismatches, BGP peering issues, OSPF table inconsistencies, broadcast storms), plans bandwidth and QoS capacity, and implements changes across the entire fleet — including third-party vendor equipment the customer depends on but doesn't own.
  3. IVMIA manages the entire compute estate. VMs across every hypervisor and cloud, physical workstations and laptops, POS terminals, field devices — with resource allocation, redistribution across hosts, hardware compatibility verification, and capacity planning.
  4. VaultSync protects everything. VMs, physical servers, network configs, company phones, and the business data embedded in all of them. Backup is not just recovery — it's a data source.

Together, they answer every question about infrastructure state: What is connected? What is allowed? What is running? Is it backed up? No external service is needed to answer these questions. The platform knows.

Cloud and On-Premises Are Implementation Details

The SDNS platform treats deployment location as an implementation detail, not an architectural decision. The same product image runs on bare metal, in a virtual machine, in a cloud instance, or in a container. The same policies apply. The same UI manages it. The same audit trail records changes.

CapabilityOn-PremisesCloud
DNSBIND9, own zonesBIND9, own zones (ignores Route 53)
DHCPKea, own reservationsAccepts cloud DHCP via cloud-init adapter
Firewallnftables, full inspectionnftables, full inspection (replaces security groups)
VPNWireGuard/IPsecWireGuard/IPsec (replaces cloud VPN gateways)
MonitoringSNMP, flow, syslogVPC flow logs, API polling, syslog
BackupLocal + remote replicationCloud storage + cross-region replication

This design eliminates the "cloud migration" problem. There is no migration. The products move with the workload. The authority stays the same.

Security Model: Nothing Gets Past

The closed-loop architecture has a direct security benefit: there are no gaps between products. In a traditional environment, the firewall doesn't know what the monitoring system sees, the backup system doesn't know what the firewall blocked, and the hypervisor manager doesn't know what any of them are doing.

In the SDNS model:

The entire response happens within the platform. No SIEM integration required. No webhook chains to configure. No "check the other dashboard." One authority, one audit trail, one response.

Regulated Industry Fit

Organizations in healthcare, finance, government, and critical infrastructure must demonstrate who controls their systems, how changes are authorized, and where the audit trail lives. The SDNS platform provides a clear answer: we are the single authority for all network, security, compute, and data protection state.

Every change flows through the platform's provisioning engine. Every change is logged. Every log is backed up. The complete chain of custody — from policy definition to enforcement to verification — exists within a system the customer controls.

No third-party cloud service can modify the state without the platform's knowledge. No external DNS provider can silently change a record. No managed firewall service can update a rule. If it's not in the platform's log, it didn't happen.

Architecture Summary

The SDNS platform is built on three principles:

1. Self-sovereign authority. The platform controls DNS, DHCP, firewall, VPN, monitoring, backup, and identity. External services are input adapters, not controllers.

2. Standalone value, integrated power. Each product works independently. Together, they form a closed loop where nothing gets past.

3. Location independence. Cloud and on-premises are implementation details. The authority, the policies, and the audit trail are the same everywhere.

© 2026 Diwan Enterprise Consulting LLC (DEC-LLC). All rights reserved.
For more information, contact info@decllc.biz or visit dec-llc.biz.