Skip to content

Governance & Power

Namespaces, Boundaries, and the Shape of Order

Namespaces are not security by themselves. They are the primary unit of operational containment and governance.

Text

Authored as doctrine; evaluated as operations.

Doctrine

Namespaces are how a cluster becomes multi-tenant without becoming incoherent. They are where governance becomes legible: access, quota, policy, and operational ownership.

Kubblai doctrine: containment is a design, not an accident.

What namespaces do well

Namespaces are strong for institutional separation.

  • RBAC scoping and least privilege.
  • Quota and LimitRange enforcement.
  • Policy rollout by tenancy domain.
  • Operational dashboards and alerts by owner.

What namespaces do not do

Treating namespaces as hard security boundaries is a category error.

  • Network isolation requires NetworkPolicy/CNI support.
  • Node-level isolation requires scheduling/taints and runtime controls.
  • Secret access is controlled by RBAC; namespace alone is not protection.

Operational design

Define naming conventions, labels/annotations for ownership, and consistent policy baselines per namespace class (prod, staging, sandbox).

A cluster without namespace hygiene becomes a forensic problem.