Skip to main content
Version: 0.1.0

Security / Workload Protections

Treat pod hardening, TLS, and image trust as one runtime surface.

Workload protections cover the controls that apply once the cluster is allowed to run: pod and container hardening, workload identity and TLS, and the supply-chain rules that decide which images the operator will trust.

Workload protection routes

  1. 01

    Pod and runtime security

    Review pod security context, filesystem, token, and container-hardening defaults.

    Open
  2. 02

    TLS and identity

    Understand server TLS, peer trust, certificate management, and workload-facing identity paths.

    Open
  3. 03

    Supply-chain verification

    Review digest pinning, signature verification, and the production guardrails around image trust.

    Open
Default runtime hardening

OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.

Next actions

Published release documentation

You are reading docs for version 0.1.0. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.