Governance & Power
Policy as Doctrine, Not Suggestion
Policy is what makes a platform institutional. Without it, every incident is negotiated from scratch.
Text
Authored as doctrine; evaluated as operations.
Doctrine
A platform becomes serious when it can say ‘no’ consistently. Policy is the mechanism of that consistency: it encodes standards, prevents predictable harm, and makes outcomes repeatable.
Kubblai doctrine rejects optional governance. Standards that are not enforced become rituals without consequence.
Policy surfaces
Policy is not one tool. It is a stack: RBAC and identity, Pod Security Admission, admission webhooks, quota, network policy, and organizational review.
Choose a small number of policy surfaces and operate them with discipline.
- Admission for object-level constraints and defaults.
- RBAC for authority boundaries.
- Quota/limits for resource fairness.
- Network policy for blast radius.
Tradeoffs
Policy increases reliability by decreasing freedom. That trade is desirable when the alternative is incident-driven chaos.
The operator’s duty is to keep policy understandable and measurable.
- Too many policies create denial-by-surprise.
- Opaque policies create shadow practices and bypasses.
- Policy must ship with documentation and examples.
Institutional practice
Treat policy like a product: version it, test it, stage it, and observe it in production. Include rollback.
Your best policy is the one you can enforce without breaking deploy velocity.
Canonical Link
Canonical URL: /library/policy-as-doctrine-not-suggestion
Related Readings
Governance & Power
LibraryAdmission Control and the Rite of Judgment
Admission is where governance becomes enforceable. It is also a place where outages are born.
Governance & Power
LibraryPod Security Admission and the Hierarchy of Trust
Pod security is a boundary between ‘works’ and ‘safe to run.’ The hierarchy of trust must be explicit and enforced.
Governance & Power
LibraryRBAC and the Governance of Power
RBAC is the cluster’s constitution. Poorly written, it becomes silent catastrophe during incident response.