Skip to main content
Version: 0.1.0-rc.5

Security / Workload Protections

Treat pod hardening, TLS, and image trust as one runtime surface.

Workload protections cover the controls that apply once the cluster is allowed to run: pod and container hardening, workload identity and TLS, and the supply-chain rules that decide which images the operator will trust.

Workload protection routes

  1. 01

    Pod and runtime security

    Review pod security context, filesystem, token, and container-hardening defaults.

    Open
  2. 02

    TLS and identity

    Understand server TLS, peer trust, certificate management, and workload-facing identity paths.

    Open
  3. 03

    Supply-chain verification

    Review digest pinning, signature verification, and the production guardrails around image trust.

    Open
Default runtime hardening

OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.

Next actions

Prerelease documentation

This version tracks a prerelease build. Features and behavior may change before the next stable release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.