3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
7.5 Operational Security Defaults
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Security defaults should reduce accidental risk without blocking normal delivery workflows.
Recommended baseline defaults:
- Enforce HTTPS for all UI/API access.
- Keep self-signed TLS only for controlled non-production environments.
- Require least-privilege user/service accounts for agents.
- Restrict project access using membership + permission model.
- Use short-lived bootstrap registration tokens for agents.
- Enable audit logging and preserve historical records.
- Prefer 2FA for privileged users.
- Protect default branch and deployment blueprints with review/approval process.
Identity and access defaults:
- No broad write access by default.
- Explicit project membership required.
- Sensitive actions (approvals, config changes, agent updates) permission-gated.
Operational hardening checklist:
- Review global config access privileges.
- Validate OAuth and SMTP secrets rotation policy.
- Confirm audit trail for config changes is active.
- Confirm notification links point to authenticated pages only.
- Confirm agents and projects are segmented by risk profile (prod vs non-prod).
Security posture objective:
- Make unsafe actions difficult by default,
- keep critical operations traceable,
- preserve fast recovery paths for incidents without bypassing governance.