Enterprise Overview
Enterprise security features, compliance controls, and hardened deployment for Baker Street.
Enterprise Overview
The Baker Street enterprise distribution (baker-street-hardened) adds security, compliance, and governance layers on top of the open-source platform. These features are implemented as composable middleware and infrastructure overlays -- they do not modify the core application.
Security Model
Baker Street's security architecture operates in layers:
Platform Layer (Open Source)
The open-source distribution includes baseline security that ships by default:
- Default-deny network policies on every pod
- Non-root containers (UID 1000) with read-only filesystems
- Dropped Linux capabilities and seccomp profiles
- Scoped secrets -- three separate Kubernetes secrets, each containing only what its service needs
- Command allowlisting on workers -- only pre-approved binaries can execute
- Task pod isolation -- zero RBAC, no ingress, NATS-only egress, 30-minute timeout
Enterprise Layer (Hardened)
The enterprise distribution adds:
- Guardrail middleware -- composable chain of checks on every tool call
- Tamper-evident audit logging -- HMAC-chain signed events shipped to external SIEM
- Namespace isolation for tasks -- dedicated namespace with Pod Security Standards
- Supply chain verification -- Trivy scanning, SBOM generation (CycloneDX), cosign image signing, Kyverno admission control
- External Secrets Operator -- replaces static Kubernetes secrets with Vault, AWS Secrets Manager, or Azure Key Vault sync
- Rate limiting and cost governance -- per-user and global request limits, daily/monthly LLM cost budgets
Compliance Mapping
The enterprise controls map to established compliance frameworks:
| Control | SOC 2 TSC | ISO 27001 | CIS K8s Benchmark |
|---|---|---|---|
| Audit logging | CC7.2, CC7.3 | A.12.4 | 5.7 |
| Network isolation | CC6.1 | A.13.1 | 5.3 |
| Secret management | CC6.1, CC6.6 | A.10.1 | 5.4 |
| Pod security | CC6.8 | A.14.1 | 5.2 |
| Supply chain | CC8.1 | A.14.2 | -- |
| Rate limiting | CC6.1 | A.12.1 | -- |
Getting Started
To deploy the enterprise distribution, see the individual feature guides:
- Guardrails Configuration -- configure the guardrail middleware chain
- Audit Logging -- set up HMAC-chain logging and SIEM integration