ProficientNowTechRFCs

3. Architecture

RFC-WORKLOAD-IDENTITY-0001                                      Section 3
Category: Standards Track                                    Architecture

3. Architecture

← Previous: Requirements | Index | Next: Components →


3.1 Identity Hierarchy

3.1.1 Enterprise Identity Model

Workload identity exists within the broader enterprise identity hierarchy:

3.1.2 Authorization Ceiling Principle

Per RFC-IAM-0001, Azure AD establishes the authorization ceiling:

LevelAuthorityConstraint
Azure ADUltimate source of truthDefines maximum possible permissions
SPIREWorkload identity issuerCan only issue identities for registered workloads
VaultCredential authorityPolicies bounded by workload identity
ApplicationResource accessBounded by Vault-issued credentials

A workload's permissions can never exceed what Azure AD allows for its organizational context.

3.1.3 Identity Layers

The architecture operates across multiple identity layers:


3.2 Trust Boundaries

3.2.1 Trust Boundary Definitions

BoundaryMeaningCrossing Requires
Cluster BoundaryDifferent Kubernetes clustersSPIFFE federation
Cloud BoundaryDifferent cloud providersWorkload identity federation
Namespace BoundaryDifferent Kubernetes namespacesRBAC, Vault policy
Service Mesh BoundaryMesh vs non-mesh trafficmTLS termination, AuthorizationPolicy
Organizational BoundaryDifferent organizations/tenantsTrust bundle exchange

3.2.2 Trust Boundary Diagram

3.2.3 Trust Establishment

Boundary TypeTrust Mechanism
Within clusterKubernetes RBAC + Service mesh
Cross-cluster (same cloud)SPIFFE federation + VPN/private link
Cross-cloudSPIFFE federation + mTLS over public network
External partnersSPIFFE trust bundle exchange + firewall rules

3.3 Authority Domains

3.3.1 Identity Authorities

Each authority is responsible for a specific identity domain:

AuthorityDomainIssues
SPIREWorkload identitySPIFFE SVIDs (X.509 + JWT)
KubernetesPod identityServiceAccount tokens
Cloud ProviderInstance identityInstance metadata, STS tokens
VaultAccess credentialsDatabase creds, cloud creds, PKI certs
LinkerdNetwork identitymTLS certificates

3.3.2 Authority Relationships

3.3.3 Authority Delegation

Delegating AuthorityReceiving AuthorityDelegation
SPIREVaultSPIFFE auth method authentication
SPIRELinkerdTrust anchor for mTLS
KubernetesSPIREPod attestation data
CloudSPIREInstance attestation data
VaultESOSecret distribution to Kubernetes

3.4 Data Flow Models

3.4.1 Workload Bootstrap Flow

3.4.2 Service-to-Service Flow

3.4.3 CI/CD Identity Flow

3.4.4 AI Agent Delegation Flow


3.5 Integration Architecture

3.5.1 Integration with RFC-IAM-0001

Integration PointDescription
Authorization CeilingWorkload permissions bounded by Azure AD context
Keycloak GroupsVault policies may reference Keycloak group for delegation
Token ExchangeAI agents use Keycloak for OAuth 2.0 Token Exchange
Audit CorrelationHuman and workload actions share correlation IDs

3.5.2 Integration with RFC-SECOPS-0001

Integration PointDescription
Vault as Credential AuthorityWorkloads authenticate to Vault for secrets
ESO DistributionWorkload secrets distributed via ExternalSecret
Dynamic CredentialsDatabase, cloud credentials from Vault engines
PushSecretWorkloads may push generated credentials to Vault

3.5.3 Integration with RFC-PAM-0001

Integration PointDescription
Teleport Machine IDVMs use Teleport tbot for machine identity
Shared VaultSame Vault SSH/database engines
Audit ConvergenceMachine and human sessions in same audit system

3.5.4 Integration Diagram


3.6 Security Model

3.6.1 Defense in Depth

LayerControlFailure Mode
IdentitySPIFFE attestationImpersonation prevented
AuthenticationShort-lived credentialsCredential theft limited
AuthorizationNamespace-scoped policiesLateral movement limited
NetworkmTLS + AuthorizationPolicyTraffic interception prevented
AuditImmutable, correlated logsInvestigations enabled

3.6.2 Threat Model

ThreatMitigation
Credential theftShort TTL (≤24h), automatic rotation
Workload impersonationAttestation-based identity
Privilege escalationAuthorization ceiling enforcement
Lateral movementNamespace isolation, mTLS
Insider threatDelegation audit, correlation IDs
Supply chain attackBinary attestation (future)

3.6.3 Zero Trust Alignment

This architecture aligns with NIST SP 800-207 Zero Trust principles:

PrincipleImplementation
All resources securedmTLS for all service traffic
Least privilegeNamespace-scoped, short-lived access
Never trust, always verifyEvery request requires valid identity
Assume breachDefense in depth, audit everything
Continuous validationSVIDs rotate, tokens renew

Document Navigation


End of Section 3