Archive Topic Map
Security
Security is governance under constraints. The goal is stable trust boundaries, not performative controls that operators bypass under pressure.
Orientation
A curated shelf for study and for retrieval.
Trust boundaries, not slogans
Kubernetes security fails when it becomes ceremonial without enforcement, or enforcement without operational escape hatches.
Kubblai doctrine is explicit: define least privilege, define break-glass, audit bypass, and treat admission as part of availability.
- RBAC determines who can act; admission determines whether actions are permitted.
- Secrets require lifecycle posture: creation, distribution, rotation, invalidation.
- NetworkPolicy creates containment; without it, namespaces are organizational, not isolating.
Core texts
Authority, sealing, and policy discipline.
Text
Codex GigasRBAC and the Governance of Power
Least privilege, role design, and the institutional cost of over-granting.
Text
Codex GigasPod Security Admission and the Hierarchy of Trust
Baseline policies, exemptions, and keeping the runtime honest.
Text
Codex GigasSupply Chain Integrity and the Lineage of Artifacts
Image provenance, registries, and what ‘trusted’ must mean in practice.
Practice and diagnostics
Least privilege without over-granting.
Related maps
Adjacent shelves for continued study.
Topic map
MapConfiguration & Secrets
Continue with the adjacent shelf.
Topic map
MapNetworking
Continue with the adjacent shelf.
Topic map
MapOperations
Continue with the adjacent shelf.
Canonical link
Canonical URL: /library/topics/security