Security / Platform Controls
Protect the control plane before you trust the workload.
Platform controls are the Kubernetes-level mechanisms that keep operator identities narrow, reject unsafe objects before they persist, and limit traffic between tenants, control-plane components, and external dependencies.
Platform control routes
- 01Open
RBAC architecture
Understand the split-controller model, narrow identities, and mutation-locked access boundaries.
- 02Open
Admission policies
See how CEL-based guardrails reject unsafe configurations and pause sensitive reconciliation when enforcement disappears.
- 03Open
Network security
Review default-deny traffic boundaries and the explicit egress model used for backups, upgrades, and integrations.
- Kubernetes
v1.33+is required by OpenBao Operator.ValidatingAdmissionPolicyis GA on all supported versions. - A CNI that actually enforces
NetworkPolicyis required for the network isolation model to be real.
Next actions
This version tracks a prerelease build. Features and behavior may change before the next stable release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.