Skip to main content

Security isn't a feature. It's the architecture.

Nuon is designed from the ground up for zero-trust environments. Every component is isolated, every action is scoped, every event is audited.

Runner Isolation

Air-gapped in your cloud

The Nuon Runner is deployed as an isolated VM inside each VPC. Egress-only networking. No inbound access. The runner communicates outbound to the Nuon control plane — nothing reaches in.

Deployed as an EC2 instance in your VPC
Egress-only networking — no inbound ports
OCI image registry for artifact sync
Isolated from both the application and control plane networks

Scoped Permissions

Different IAM roles for each lifecycle stage

The runner never holds a single broad permission set. Each stage of the install lifecycle uses a separate IAM role with the minimum permissions required.

PROVISION

Provision

Create infrastructure: VPCs, clusters, databases, networking. Used only during initial setup.

MAINTENANCE

Maintenance

Deploy updates, sync images, run health checks. The day-to-day operational role.

DE-PROVISION

De-Provision

Tear down infrastructure cleanly. Separate from provision to prevent accidental destruction.

BREAKGLASS

BreakGlass

Emergency access for debugging. Time-limited, fully audited, requires explicit activation.

Compliance & Auditability

Every action is logged and attributable

Full audit trail from the control plane through the runner to the application. Drift detection catches unauthorized changes. Image scanning validates artifacts before deployment.

Audit Logs

Every runner action is logged with actor, timestamp, and outcome.

Drift Detection

Continuous monitoring for infrastructure state divergence.

Image Scanning

Container images validated against vulnerability databases before deploy.

Policy Enforcement

Kyverno policies enforce infrastructure and application standards.

Secure Delivery

Push updates with controls, not permissions

Updates flow through a controlled pipeline: diff review, approval gates, release windows, and dynamic access policies. Vendors push updates — you approve them.

Diff viewer & approvals before any change lands
Dynamic access policies scoped to the update
Configurable release windows
BreakGlass procedures with full audit trail

Have security questions? Let's walk through the architecture.