Skip to main content
Version: 0.1.0

Security / Security Model

Start from the trust model before you choose controls.

This section explains what the operator is trying to defend, which production posture it considers safe, and how trust material such as root tokens, unseal keys, and bootstrap identities should behave across the lifecycle.

Security model routes

  1. 01

    Threat model

    Read the trust boundaries, attacker assumptions, and design mitigations behind the operator.

    Open
  2. 02

    Production posture

    Understand what Development and Hardened actually mean, and why Hardened is the supported production contract.

    Open
  3. 03

    Secrets and trust material

    Review how root tokens, unseal keys, and bootstrap credentials are created, stored, or intentionally avoided.

    Open

Next actions

Published release documentation

You are reading docs for version 0.1.0. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.