Skip to main content
Version: 0.2.x

Security / Security Model

Security model and trust assumptions

Threat model, security profiles, and trust material such as root tokens, unseal keys, and bootstrap identities.

Security model routes

  1. 01

    Threat model

    Trust boundaries, attacker assumptions, and design mitigations.

    Open
  2. 02

    Production posture

    How Development and Hardened differ, and the supported production contract.

    Open
  3. 03

    Secrets and trust material

    Review how root tokens, unseal keys, and bootstrap credentials are created, stored, or intentionally avoided.

    Open

Next actions

Published release documentation

You are reading docs for version 0.2.x. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.