3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
3.8 Security and Trust Boundaries
Orbnetes deployment and release orchestration documentation for operators and platform teams.
3.8.1 API Trust Boundary
Agents authenticate to API and only receive eligible jobs; job creation and approval decisions remain in control plane.
3.8.2 Credential Boundary
Secrets are injected at runtime; blueprint YAML should not contain raw credentials.
3.8.3 Host Boundary
Agents run on infrastructure hosts; host hardening and service-user least privilege remain critical.
3.8.4 Update Boundary
Agent updates are server-driven; only trusted binaries and controlled release channels should be published.