Security
Security is part of the operating path, not an appendix.
Use this section to understand the operator trust model, choose the production posture you actually want to defend, and verify the controls that enforce it from the platform layer down to workload and tenant boundaries.
Security layers
- 01Open
Security model
Threat model, production posture, and the trust material assumptions behind the operator design.
- 02Open
Platform controls
RBAC architecture, admission policies, and network boundaries that protect the control plane first.
- 03Open
Workload protections
Pod hardening, TLS identity, and supply-chain verification for the deployed service.
- 04Open
Tenant isolation
Namespace boundaries, tenancy guarantees, and the limits of the shared-service model.
Related task pages
This version tracks a prerelease build. Features and behavior may change before the next stable release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.