Skip to main content

Defense-in-Depth Security Model

Petra implements security controls at every stage of the artifact lifecycle, from image build to runtime execution.

No SSH

There is no SSH daemon, no SSH keys, and no port 22. All administrative access is through AWS Systems Manager (SSM) Session Manager, which provides authenticated, encrypted, and fully audited shell access.

FIPS Everywhere

FIPS 140-2 validated cryptography is mandatory for all components regardless of deployment target:

  • k3s uses Go 1.24 native FIPS crypto (CAVP A6650, replaces deprecated BoringCrypto)
  • Chainguard images include FIPS variants
  • All TLS connections use FIPS-approved cipher suites
  • FIPS mode enforced at runtime via GODEBUG=fips140=on

Immutable Infrastructure

Flatcar's read-only root filesystem prevents runtime modification of the operating system. Compromised workloads cannot install packages, modify system binaries, or persist backdoors. Node remediation is replacement, not repair.

eBPF Security

  • Cilium: Identity-aware network policies at L3/L4/L7
  • Tetragon: Syscall-level monitoring, process execution tracking, file integrity detection

Admission Control

  • OPA Gatekeeper: No privileged containers, image source restrictions, required resource limits, required labels
  • Sigstore Policy Controller: Cosign signature verification on every image at admission time

Supply Chain Verification

StageControl
Image sourcingChainguard (minimal, no shell, no package manager)
Build-timeCosign verify, vulnerability scan, SBOM generation
BundleSigned archive, per-image digests, metadata manifest
AdmissionSigstore policy-controller re-verifies signatures
RuntimeTetragon monitors process execution and file access
Continuouskube-bench CIS benchmarks

NIST 800-53 Control Coverage

ControlDescriptionImplementation
AC-6Least PrivilegeNo SSH, SSM-only, RBAC, Gatekeeper
AU-2Audit EventsCloudTrail, K8s audit logs, Tetragon
CM-7Least FunctionalityImmutable OS, minimal images
SC-13Cryptographic ProtectionFIPS 140-2 Go 1.24 native (CAVP A6650)
SI-7Software IntegrityCosign at build, transfer, admission
SR-4ProvenanceSLSA L3, SBOM, digest pinning