3.8 Security and Trust Boundaries

Orbnetes deployment and release orchestration documentation for operators and platform teams.

3.8.1 API Trust Boundary

Agents authenticate to API and only receive eligible jobs; job creation and approval decisions remain in control plane.

3.8.2 Credential Boundary

Secrets are injected at runtime; blueprint YAML should not contain raw credentials.

3.8.3 Host Boundary

Agents run on infrastructure hosts; host hardening and service-user least privilege remain critical.

3.8.4 Update Boundary

Agent updates are server-driven; only trusted binaries and controlled release channels should be published.