Security / Workload Protections
Treat pod hardening, TLS, and image trust as one runtime surface.
Workload protections cover the controls that apply once the cluster is allowed to run: pod and container hardening, workload identity and TLS, and the supply-chain rules that decide which images the operator will trust.
Workload protection routes
- 01Open
Pod and runtime security
Review pod security context, filesystem, token, and container-hardening defaults.
- 02Open
TLS and identity
Understand server TLS, peer trust, certificate management, and workload-facing identity paths.
- 03Open
Supply-chain verification
Review digest pinning, signature verification, and the production guardrails around image trust.
OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.
Next actions
You are reading docs for version 0.1.0. Use the version menu to switch to next or another archived release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.