Security / Security Model
Start from the trust model before you choose controls.
This section explains what the operator is trying to defend, which production posture it considers safe, and how trust material such as root tokens, unseal keys, and bootstrap identities should behave across the lifecycle.
Security model routes
- 01Open
Threat model
Read the trust boundaries, attacker assumptions, and design mitigations behind the operator.
- 02Open
Production posture
Understand what Development and Hardened actually mean, and why Hardened is the supported production contract.
- 03Open
Secrets and trust material
Review how root tokens, unseal keys, and bootstrap credentials are created, stored, or intentionally avoided.
Next actions
You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.