Skip to main content
Version: next

Security / Platform Controls

Protect the control plane before you trust the workload.

Platform controls are the Kubernetes-level mechanisms that keep operator identities narrow, reject unsafe objects before they persist, and limit traffic between tenants, control-plane components, and external dependencies.

Platform control routes

  1. 01

    RBAC architecture

    Understand the split-controller model, narrow identities, and mutation-locked access boundaries.

    Open
  2. 02

    Admission policies

    See how CEL-based guardrails reject unsafe configurations and pause sensitive reconciliation when enforcement disappears.

    Open
  3. 03

    Network security

    Review default-deny traffic boundaries and the explicit egress model used for backups, upgrades, and integrations.

    Open
Cluster prerequisites
  • Kubernetes v1.33+ is required by OpenBao Operator. ValidatingAdmissionPolicy is GA on all supported versions.
  • A CNI that actually enforces NetworkPolicy is required for the network isolation model to be real.

Next actions

Next release documentation

You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.