Security / Platform Controls
Protect the control plane before you trust the workload.
Platform controls are the Kubernetes-level mechanisms that keep operator identities narrow, reject unsafe objects before they persist, and limit traffic between tenants, control-plane components, and external dependencies.
Platform control routes
- 01Open
RBAC architecture
Understand the split-controller model, narrow identities, and mutation-locked access boundaries.
- 02Open
Admission policies
See how CEL-based guardrails reject unsafe configurations and pause sensitive reconciliation when enforcement disappears.
- 03Open
Network security
Review default-deny traffic boundaries and the explicit egress model used for backups, upgrades, and integrations.
- Kubernetes
v1.33+is required by OpenBao Operator.ValidatingAdmissionPolicyis GA on all supported versions. - A CNI that actually enforces
NetworkPolicyis required for the network isolation model to be real.
Next actions
You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.