Security / Workload Protections
Workload security controls
Pod and container hardening, workload identity and TLS, and image verification.
Workload protection routes
- 01Open
Pod and runtime security
Pod security context, filesystem, token, and container-hardening defaults.
- 02Open
TLS and identity
Server TLS, peer trust, certificate management, and workload-facing identity paths.
- 03Open
Supply-chain verification
Digest pinning, signature verification, and image-trust guardrails.
OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page should explain exceptions and platform dependencies, not re-argue the baseline.
OpenBao Pods are expected to run non-root with a read-only root filesystem, dropped Linux capabilities, and a RuntimeDefault seccomp profile. The detailed page covers exceptions and platform dependencies.
Next actions
You are reading docs for version 0.2.x. Use the version menu to switch to next or another archived release.
Was this page helpful?
Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.