Skip to content

ACRA Enclaves

The ACRA portal defines the primary access and governance boundary for a deployment. Within this boundary, an ACRA enclave is an isolated execution environment that hosts one or more applications together with their required supporting services, and acts as a secondary, nested boundary enforcing compute, storage, network, and identity isolation.

What Enclaves Are

An enclave contains:

  • Application workloads
  • Supporting services such as databases or messaging systems
  • Policy definitions governing communication and access
  • Enclave-scoped identity and secret bindings

Enclaves execute on shared underlying infrastructure, including containerised workloads and optional virtual machine isolation (for example via KubeVirt), while remaining isolated at the compute, storage, network, and identity layers. Isolation is enforced by the platform, not by application logic.

Isolation is enforced by platform mechanisms rather than by application logic. Applications, Valarian and Custom, inherit authentication, encryption in transit, encryption at rest, explicit ingress and egress controls, and workload-scoped authorisation without implementing those controls themselves.

An enclave is therefore a hard boundary with defined ingress, egress, identity scope, and policy enforcement.

Threat Model

ACRA enclaves operate under an assumed-breach model.

The platform assumes:

  • workloads may contain vulnerabilities
  • infrastructure may be multi-tenant
  • external networks are untrusted
  • users may have differing privilege levels

Under this model the enclave prevents:

  • lateral movement between enclaves
  • unauthorised east-west communication
  • uncontrolled data egress
  • privilege escalation from workload to control plane

Default-deny networking ensures that workloads cannot initiate communication outside their defined policy scope.

Identity enforcement at the enclave boundary ensures that access to services and data is authenticated and authorised before execution proceeds.

Separation between control plane and application plane prevents compromise of a workload from granting administrative authority over enclave lifecycle or policy.

This threat model does not rely on application correctness. It relies on enforced architectural boundaries.

Isolation Guarantees

Isolation in ACRA enclaves is enforced across multiple layers.

Compute Isolation

Workloads run as isolated containers and pods with enforced resource limits.

Multiple enclaves may run on the same node, but runtime separation is enforced through orchestration and policy controls.

Node-level placement policies can further constrain sensitive workloads when required.

Network Isolation

All ingress and egress traffic is policy-defined and default-deny.

Nothing enters or leaves an enclave unless explicitly permitted.

All traffic flows through controlled interfaces where identity and authorisation are validated.

This applies to:

  • enclave-to-enclave communication
  • enclave-to-external systems
  • external systems calling into an enclave

If a communication path is not declared in policy, it does not exist.

Identity and Secret Isolation

Enclaves do not share identity scopes, permissions, or secrets.

RBAC and ReBAC models enforce workload-level and user-level authorisation.

Secrets are injected per workload rather than embedded in application code.

Compromise of one enclave does not grant identity or secret access to another enclave.

Data Isolation

Encryption at rest is enforced by platform storage services.

Encryption in transit is enforced by service mesh controls.

Application data, logs, and runtime state remain enclave-scoped unless explicit federation is configured.

Lifecycle of an Enclave

The enclave lifecycle is managed exclusively by the control plane.

The control plane is responsible for:

  • creating enclaves
  • applying configuration and policy
  • deploying and updating applications
  • managing permissions and secrets
  • publishing status and health visibility

The enclave plane executes workloads and enforces runtime policy.

It does not control its own creation, identity model, or external permissions.

Enclaves are provisioned through declarative configuration and remain active until explicitly deleted.

There is no sleep or archive state at the control plane, core, or infrastructure level.

Deletion removes the active runtime environment according to configured operational procedures.

Operational visibility includes:

  • deployment validation
  • health checks and metrics
  • issue reporting with contextual logs
  • update readiness gating

This lifecycle model ensures enclave state transitions remain controlled, observable, and attributable.

Control Plane vs Application Plane

ACRA maintains a strict separation between the control plane** and the **enclave plane.

Control Plane Responsibilities

The control plane:

  • manages lifecycle and configuration
  • controls permissions and identity models
  • provides version visibility and health status

It does not execute application logic or access application data.

Enclave Plane Responsibilities

The enclave plane:

  • runs application workloads
  • processes mission data
  • enforces runtime network and identity policy

It cannot alter its own lifecycle state or expand its trust boundaries.

This separation prevents workload compromise from escalating into platform-level compromise.

Conclusion

ACRA enclaves provide enforced isolation, explicit communication control, and lifecycle governance at the architectural level.

They constrain blast radius, prevent implicit trust, and allow sensitive workloads to operate securely on shared infrastructure without cross-environment contamination.