ProficientNowTechRFCs

9. Tenant Isolation

RFC-TENANT-SECURITY-0001                                         Section 9
Category: Standards Track                                  Tenant Isolation

9. Tenant Isolation

← Rate Limiting | Index | Next: Rationale →


9.1 Isolation Overview

9.1.1 Multi-Tenancy Model

The platform supports multiple tenants sharing cluster resources while maintaining security isolation. Each tenant operates within defined boundaries that prevent unauthorized access to other tenants' resources.

9.1.2 Isolation Dimensions

DimensionMechanismInvariant
NetworkNetworkPolicyINV-5, INV-6
NamespaceKubernetes RBAC
SecretsVault policiesRFC-SECOPS-0001
IdentityKeycloak realmsRFC-IAM-0001
ComputeResource quotas

9.2 Namespace Model

9.2.1 Namespace Types

TypeNaming PatternOwnerPurpose
Platform<service> or <service>-systemPlatform TeamPlatform services
Tenant<tenant>-<environment>TenantApplication workloads
Sharedshared-<purpose>Platform TeamCross-tenant services

9.2.2 Namespace Security Baseline

Every tenant namespace MUST have:

RequirementPurposeInvariant
Default-deny ingress policyZero trust baselineINV-5
Controlled egress policyPrevent data exfiltrationINV-7
Resource quotasPrevent resource abuse
RBAC bindingsAccess control
Network policy labelsPolicy targeting

9.2.3 Namespace Labels

Standard labels for policy targeting:

LabelPurposeExample
tenantTenant identifiertenant: acme-corp
environmentEnvironment typeenvironment: production
isolationIsolation levelisolation: strict
data-classificationData sensitivitydata-classification: confidential

9.3 Network Isolation

9.3.1 Isolation Levels

LevelCross-NamespaceInternet EgressUse Case
StrictDeniedDeniedHigh-security workloads
StandardExplicit allowExplicit allowMost workloads
RelaxedNamespace groupAllowedDevelopment

9.3.2 Strict Isolation

For high-security workloads:

9.3.3 Standard Isolation

For typical workloads:

TrafficPolicy
Ingress from BunkerWebAllowed
Ingress from monitoringAllowed
Ingress from same namespaceAllowed
Ingress from other namespacesExplicit allow required
Egress to same namespaceAllowed
Egress to DNSAllowed
Egress to platform servicesExplicit allow required
Egress to internetExplicit allow required

9.4 Cross-Tenant Communication

9.4.1 Default Behavior

Cross-tenant communication is DENIED by default (INV-6).

9.4.2 Authorized Cross-Tenant Access

When cross-tenant access is required:

RequirementDescription
Business justificationDocumented reason
Security reviewApproved by Security Team
Bilateral policiesBoth tenants must configure policies
Audit loggingTraffic logged
Periodic reviewAccess reviewed quarterly

9.4.3 Cross-Tenant Flow


9.5 Platform Service Access

9.5.1 Platform Services

Tenants may need access to platform services:

ServiceNamespaceAccess Method
KeycloakkeycloakExplicit egress policy
MonitoringmonitoringPush or allow scrape
LoggingloggingPush via agent
VaultvaultVia ESO (not direct)

9.5.2 Platform Access Patterns

9.5.3 Platform Access Controls

ServiceDirectionControl
KeycloakTenant → PlatformTenant egress policy
PrometheusPlatform → TenantTenant ingress policy
ESOPlatform → TenantESO operates in tenant namespace

9.6 Tenant Onboarding

9.6.1 Onboarding Requirements

RequirementDescription
Namespace creationVia GitOps template
Security baselineDefault policies applied
Resource quotasLimits configured
RBAC bindingsAccess control established
MonitoringMetrics and logging configured

9.6.2 Namespace Template

Every new tenant namespace receives:

ComponentPurpose
Default-deny ingress policySecurity baseline (INV-5)
Controlled egress policySecurity baseline (INV-7)
Ingress allow policyTraffic from BunkerWeb
Monitoring allow policyPrometheus scraping
Resource quotaCompute limits
Limit rangePer-pod limits

9.6.3 Onboarding Flow


9.7 Tenant Offboarding

9.7.1 Offboarding Requirements

RequirementDescription
Workload removalAll pods terminated
Secret cleanupVault paths removed
Policy removalNetworkPolicies deleted
Namespace deletionNamespace removed
Audit retentionLogs retained per policy

9.7.2 Offboarding Flow


9.8 Compliance Considerations

9.8.1 Isolation Evidence

RequirementEvidence
SOC 2 CC6.1Namespace isolation policies
ISO 27001 A.13.1.3Network segmentation documentation
PCI DSS 1.2Cardholder data isolation

9.8.2 Audit Requirements

Audit TypeFrequencyContent
Policy reviewQuarterlyAll tenant policies
Cross-tenant accessQuarterlyAuthorized cross-tenant flows
Isolation testingAnnuallyPenetration testing

Document Navigation


End of Section 9