Skip to main content

Security & Compliance

Overview

OpsWorker's security architecture is built on the principles of least privilege, defense in depth, and human oversight.

Security Architecture

Agent Security

ControlImplementation
Read-only accessAgent only performs get/list/watch operations
Outbound-only communicationNo inbound ports; agent polls SQS
No stored credentialsCluster token only; no kubeconfig in cloud
Scoped RBACConfigurable permissions, namespace restrictions
Minimal footprintSingle pod, no DaemonSets or sidecars

Cloud Security

ControlImplementation
ServerlessNo servers to patch or manage
Multi-tenant isolationOrganization-level data partitioning
EncryptionAt rest (AES-256) and in transit (TLS 1.2+)
Access controlRole-based access in portal (Admin/Member)
Audit loggingInvestigation activities logged

Application Security

ControlImplementation
AuthenticationSSO (Google, Azure AD), email/password with MFA
AuthorizationRole-based access control
Session managementSecure session handling via Auth0
API securityAuthenticated API endpoints

Human Oversight

OpsWorker never auto-executes commands on your cluster:

  • Recommendations are suggestions for human review
  • Engineers decide what to execute and when
  • The safe execution model ensures humans stay in control

Compliance

StandardStatus
SOC 2Compliance pathway — contact OpsWorker for details
Data residencyAWS region-specific — contact for region options
GDPRData processing aligned with GDPR requirements

For specific compliance questions or security documentation requests, contact the OpsWorker team.

Next Steps