Skip to main content
Version: next

Security / Workload Protections

Treat pod hardening, TLS, and image trust as one runtime surface.

Workload protections cover the controls that apply once the cluster is allowed to run: pod and container hardening, workload identity and TLS, and the supply-chain rules that decide which images the operator will trust.

Workload protection routes

  1. 01

    Pod and runtime security

    Review pod security context, filesystem, token, and container-hardening defaults.

    Open
  2. 02

    TLS and identity

    Understand server TLS, peer trust, certificate management, and workload-facing identity paths.

    Open
  3. 03

    Supply-chain verification

    Review digest pinning, signature verification, and the production guardrails around image trust.

    Open
Default runtime hardening

OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.

Next actions

Next release documentation

You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.