Skip to main content
Version: 0.1.0-rc.5

Security / Platform Controls

Protect the control plane before you trust the workload.

Platform controls are the Kubernetes-level mechanisms that keep operator identities narrow, reject unsafe objects before they persist, and limit traffic between tenants, control-plane components, and external dependencies.

Platform control routes

  1. 01

    RBAC architecture

    Understand the split-controller model, narrow identities, and mutation-locked access boundaries.

    Open
  2. 02

    Admission policies

    See how CEL-based guardrails reject unsafe configurations and pause sensitive reconciliation when enforcement disappears.

    Open
  3. 03

    Network security

    Review default-deny traffic boundaries and the explicit egress model used for backups, upgrades, and integrations.

    Open
Cluster prerequisites
  • Kubernetes v1.33+ is required by OpenBao Operator. ValidatingAdmissionPolicy is GA on all supported versions.
  • A CNI that actually enforces NetworkPolicy is required for the network isolation model to be real.

Next actions

Prerelease documentation

This version tracks a prerelease build. Features and behavior may change before the next stable release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.