7.5 Operational Security Defaults

Orbnetes deployment and release orchestration documentation for operators and platform teams.

Security defaults should reduce accidental risk without blocking normal delivery workflows.

Recommended baseline defaults:

  • Enforce HTTPS for all UI/API access.
  • Keep self-signed TLS only for controlled non-production environments.
  • Require least-privilege user/service accounts for agents.
  • Restrict project access using membership + permission model.
  • Use short-lived bootstrap registration tokens for agents.
  • Enable audit logging and preserve historical records.
  • Prefer 2FA for privileged users.
  • Protect default branch and deployment blueprints with review/approval process.

Identity and access defaults:

  • No broad write access by default.
  • Explicit project membership required.
  • Sensitive actions (approvals, config changes, agent updates) permission-gated.

Operational hardening checklist:

  1. Review global config access privileges.
  2. Validate OAuth and SMTP secrets rotation policy.
  3. Confirm audit trail for config changes is active.
  4. Confirm notification links point to authenticated pages only.
  5. Confirm agents and projects are segmented by risk profile (prod vs non-prod).

Security posture objective:

  • Make unsafe actions difficult by default,
  • keep critical operations traceable,
  • preserve fast recovery paths for incidents without bypassing governance.