← Back

Security

Runtime boundary enforcement

Workflows execute within explicitly granted resource and communication boundaries.

Architectural Principle

Execution must be constrained by default.

A distributed automation product should not assume implicit network access, file access, or cross-service privileges. Every capability must be explicitly granted and enforceable at runtime.

Trust begins with bounded execution.

How Opscotch Implements It

Customers define runtime policy during installation, including approved hosts, ports, HTTP methods, file access scope, and deployment-to-deployment communication rules.

The runtime evaluates every outbound network call, file operation, and cross-deployment request against this policy before execution.

Access is deny-by-default. Capabilities must be explicitly declared and approved.

The same workflow artifact can operate safely across different environments because boundaries are enforced by the runtime, not embedded in code.

Why It Matters for Vendors

Vendors can distribute portable automation products without embedding customer-specific infrastructure assumptions.

Enforcement is handled by the runtime, reducing the need for conditional logic or insecure configuration shortcuts.

A single artifact can be safely deployed across multiple customers with different infrastructure constraints.

Why It Matters for Customers

Customers retain direct control over what workflows can access inside their infrastructure.

There are no hidden outbound calls or implicit permissions.

Security teams can review, approve, and audit granted capabilities before execution, aligning automation with governance policies.