Security isn't a feature. It's the architecture.
Nuon is designed from the ground up for zero-trust environments. Every component is isolated, every action is scoped, every event is audited.
Runner Isolation
Air-gapped in your cloud
The Nuon Runner is deployed as an isolated VM inside each VPC. Egress-only networking. No inbound access. The runner communicates outbound to the Nuon control plane — nothing reaches in.
Scoped Permissions
Different IAM roles for each lifecycle stage
The runner never holds a single broad permission set. Each stage of the install lifecycle uses a separate IAM role with the minimum permissions required.
Provision
Create infrastructure: VPCs, clusters, databases, networking. Used only during initial setup.
Maintenance
Deploy updates, sync images, run health checks. The day-to-day operational role.
De-Provision
Tear down infrastructure cleanly. Separate from provision to prevent accidental destruction.
BreakGlass
Emergency access for debugging. Time-limited, fully audited, requires explicit activation.
Compliance & Auditability
Every action is logged and attributable
Full audit trail from the control plane through the runner to the application. Drift detection catches unauthorized changes. Image scanning validates artifacts before deployment.
Audit Logs
Every runner action is logged with actor, timestamp, and outcome.
Drift Detection
Continuous monitoring for infrastructure state divergence.
Image Scanning
Container images validated against vulnerability databases before deploy.
Policy Enforcement
Kyverno policies enforce infrastructure and application standards.
Secure Delivery
Push updates with controls, not permissions
Updates flow through a controlled pipeline: diff review, approval gates, release windows, and dynamic access policies. Vendors push updates — you approve them.