Security / Workload Protections
Treat pod hardening, TLS, and image trust as one runtime surface.
Workload protections cover the controls that apply once the cluster is allowed to run: pod and container hardening, workload identity and TLS, and the supply-chain rules that decide which images the operator will trust.
Workload protection routes
- 01Open
Pod and runtime security
Review pod security context, filesystem, token, and container-hardening defaults.
- 02Open
TLS and identity
Understand server TLS, peer trust, certificate management, and workload-facing identity paths.
- 03Open
Supply-chain verification
Review digest pinning, signature verification, and the production guardrails around image trust.
OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.
Next actions
This version tracks a prerelease build. Features and behavior may change before the next stable release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.