ProficientNowTechRFCs

Appendix A: Glossary

RFC-TENANT-SECURITY-0001                                        Appendix A
Category: Standards Track                                         Glossary

Appendix A: Glossary

← Evolution | Index | Next: Appendix B →


A.1 Terms and Definitions

A.1.1 Security Terms

TermDefinition
BotAutomated software that interacts with web services, potentially for malicious purposes
Brute Force AttackAttack method using repeated attempts to guess credentials
CAPTCHAChallenge-response test to determine whether a user is human
Circuit BreakerPattern that stops requests to a failing service to prevent cascade failures
Cross-Site Scripting (XSS)Attack injecting malicious scripts into web pages
DDoSDistributed Denial of Service; attack overwhelming services with traffic
Defense in DepthSecurity strategy using multiple layers of protection
DNSBLDNS-based Blackhole List; IP reputation service via DNS
EgressOutbound network traffic from a pod or namespace
False PositiveLegitimate request incorrectly identified as malicious
GuardrailSecurity policy that cannot be overridden by tenants
IngressInbound network traffic to a pod or namespace
Lateral MovementAttacker technique of moving between systems after initial compromise
mTLSMutual TLS; both client and server authenticate via certificates
OWASPOpen Web Application Security Project
Rate LimitingControlling the rate of requests to prevent abuse
SQL InjectionAttack inserting malicious SQL into application queries
SSRFServer-Side Request Forgery; attack making server request internal resources
Token BucketAlgorithm for rate limiting allowing burst traffic
Trust BoundaryPoint where security context changes
WAFWeb Application Firewall
Zero TrustSecurity model assuming no implicit trust

A.1.2 Kubernetes Terms

TermDefinition
CNIContainer Network Interface; plugin for container networking
CRDCustom Resource Definition; extends Kubernetes API
DaemonSetEnsures pod runs on all (or selected) nodes
IngressKubernetes API for HTTP routing to services
NamespaceVirtual cluster for resource isolation
NetworkPolicyKubernetes resource controlling pod network traffic
PodSmallest deployable unit in Kubernetes
ServiceKubernetes abstraction for exposing applications

A.1.3 Architecture Terms

TermDefinition
East-West TrafficTraffic between services within the cluster
North-South TrafficTraffic between external clients and cluster services
TenantOrganization or team with isolated resources
WorkloadApplication or service running in the cluster

A.1.4 Technology Terms

TermDefinition
BunkerWebOpen-source WAF and ingress controller
CalicoCNI plugin providing networking and network policy
cert-managerKubernetes certificate management controller
OWASP CRSOWASP Core Rule Set; standard WAF rules
Let's EncryptFree, automated certificate authority
LinkerdService mesh for Kubernetes

A.2 Acronyms

AcronymExpansion
ACMEAutomatic Certificate Management Environment
APIApplication Programming Interface
CACertificate Authority
CDNContent Delivery Network
CIDRClassless Inter-Domain Routing
CNIContainer Network Interface
CRDCustom Resource Definition
CRSCore Rule Set
CSPContent Security Policy
DDoSDistributed Denial of Service
DNSDomain Name System
DNSBLDNS-based Blackhole List
ESOExternal Secrets Operator
HSTSHTTP Strict Transport Security
HTTPHypertext Transfer Protocol
HTTPSHTTP Secure
IAMIdentity and Access Management
IPInternet Protocol
JWTJSON Web Token
LBLoad Balancer
MLMachine Learning
mTLSMutual Transport Layer Security
OIDCOpenID Connect
OWASPOpen Web Application Security Project
PAMPrivileged Access Management
PKIPublic Key Infrastructure
RBACRole-Based Access Control
RFCRequest for Comments
SIEMSecurity Information and Event Management
SNIServer Name Indication
SQLStructured Query Language
SSRFServer-Side Request Forgery
TLSTransport Layer Security
UIUser Interface
URLUniform Resource Locator
WAFWeb Application Firewall
XSSCross-Site Scripting

A.3 Diagram Index

DiagramSectionDescription
Defense-in-Depth Model0 (Index)Security layer overview
System Overview3.1Complete traffic flow
Traffic Flow States3.2.3Request state transitions
Trust Boundaries3.3.1Trust zones and boundaries
Authority Hierarchy3.4.2Policy authority structure
Inbound Request Flow3.5.1Sequence diagram of request processing
Cross-Namespace Request Flow3.5.2Sequence diagram of cross-namespace traffic
RFC Integration Points3.6.1Integration with other RFCs
Component Overview4.1Primary components
Request Processing Sequence4.5.1Component interaction sequence
TLS Termination Flow5.1.1Single entry point diagram
Certificate Lifecycle5.2.2Certificate state transitions
Backend Communication5.5.1Ingress to service flow
WAF Processing6.1.1WAF decision flow
Rule Hierarchy6.2.1WAF rule layers
Mode Transitions6.3.2WAF mode state diagram
Exception Lifecycle6.4.2Exception state transitions
Challenge Flow6.5.3Bot challenge sequence
Network Policy Overview7.1.1Namespace isolation
Policy Layers7.2.1Policy hierarchy
Cross-Namespace Flow7.4.3Bilateral policy requirement
Egress Control Model7.5.1Egress destinations
Policy Management Flow7.7.1Policy lifecycle
Rate Limiting Flow8.1.1Rate limit decision
Token Bucket8.4.1Token bucket state
Circuit Breaker8.7.3Circuit breaker states
Multi-Tenancy Model9.1.1Tenant boundaries
Strict Isolation9.3.2Strict isolation pattern
Cross-Tenant Flow9.4.3Cross-tenant sequence
Platform Access9.5.2Platform service access
Onboarding Flow9.6.3Tenant onboarding
Offboarding Flow9.7.2Tenant offboarding
Gateway API Migration11.2.4Migration path

A.4 Invariant Index

IDStatementSection
INV-1All external HTTP/HTTPS traffic MUST pass through WAF2.3.1
INV-2All public endpoints MUST use TLS 1.2+2.3.1
INV-3Certificate provisioning MUST be automated2.3.1
INV-4WAF rules MUST operate in detection before enforcement2.3.1
INV-5All tenant namespaces MUST have default-deny ingress2.3.2
INV-6Cross-namespace traffic MUST be explicitly authorized2.3.2
INV-7Egress to internet MUST be controlled2.3.2
INV-8Platform guardrails MUST NOT be overridable2.3.2
INV-9All blocked requests MUST be logged2.3.3
INV-10Network flows MUST be observable2.3.3
INV-11WAF events MUST integrate with monitoring2.3.3
INV-12Network policies MUST be in Git2.3.4
INV-13WAF customizations MUST be version controlled2.3.4
INV-14TLS secrets MUST be automated2.3.4

Document Navigation


End of Appendix A

On this page