Skip to main content
Version: next

Security / Security Model

Start from the trust model before you choose controls.

This section explains what the operator is trying to defend, which production posture it considers safe, and how trust material such as root tokens, unseal keys, and bootstrap identities should behave across the lifecycle.

Security model routes

  1. 01

    Threat model

    Read the trust boundaries, attacker assumptions, and design mitigations behind the operator.

    Open
  2. 02

    Production posture

    Understand what Development and Hardened actually mean, and why Hardened is the supported production contract.

    Open
  3. 03

    Secrets and trust material

    Review how root tokens, unseal keys, and bootstrap credentials are created, stored, or intentionally avoided.

    Open

Next actions

Next release documentation

You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.