Security / Security Model
Security model and trust assumptions
Threat model, security profiles, and trust material such as root tokens, unseal keys, and bootstrap identities.
Security model routes
- 01Open
Threat model
Trust boundaries, attacker assumptions, and design mitigations.
- 02Open
Production posture
How Development and Hardened differ, and the supported production contract.
- 03Open
Secrets and trust material
Review how root tokens, unseal keys, and bootstrap credentials are created, stored, or intentionally avoided.
Next actions
Published release documentation
You are reading docs for version 0.2.x. Use the version menu to switch to next or another archived release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.