Skip to main content

Kryptos

The hidden foundation of platform security — managing cryptographic primitives, secrets infrastructure, and security controls that underpin all teams on the platform.

  • OpenBao: Dynamic secrets, PKI certificate issuance, and short-lived credentials for all teams — deployed on a dedicated Pneuma-managed cluster

Repositories

  • pt-kryptos: Secrets infrastructure and cryptographic primitives — OpenBao deployment and platform security controls

AI Context

Context

Kryptos consumes from Pneuma (runs OpenBao on Pneuma-managed clusters) and supplies secrets management to all teams. See team dependencies.

Glossary

TermMeaning in this context
Dynamic credentialA short-lived secret generated on demand and automatically revoked on lease expiry
EngineA secrets backend (PKI, KV, database) that generates or stores credentials
KeyA cryptographic key managed by GCP KMS for encryption or signing
LeaseA time-bound grant on a dynamic secret — expiry automatically revokes access
PathThe OpenBao mount path addressing a specific secret or engine endpoint
PolicyAn OpenBao ACL rule controlling which paths a token can read or write
RotationReplacing a secret or key before its lease or validity period expires
SecretA sensitive value (password, certificate, API key) managed by OpenBao
TokenAn OpenBao authentication credential scoped to one or more policies

Team Topologies

Cognitive Load

Kryptos owns two domains of high inherent complexity — secrets infrastructure and cryptographic primitives. The scope is deliberately narrow: depth over breadth, with no cluster operations burden (Pneuma handles that) and no deployment pipeline overhead (Techne handles that).

Working DomainsHigh Intrinsic Domains
🟢 2 / 4🟡 2 / 3

Cognitive load by domain:

DomainIntrinsicExtraneous Reduced ByGermane Expertise
Secrets Infrastructure🔴 HighPneuma-managed clusterOpenBao, dynamic secrets
Cryptographic Primitives🔴 HighGCP KMS handles key infrastructurePKI, key lifecycle design

Capacity: 2 high-complexity domains (Team Topologies guideline: 2–3); team members hold 2 active domains — well within the ~4 working-knowledge limit. This leaves intentional headroom — scope expansion into a third high-complexity domain would approach the team's cognitive ceiling.

Extraneous load is minimized by:

  • OpenBao runs on Pneuma-managed clusters — no cluster operations burden
  • GCP KMS manages key infrastructure at scale — Kryptos configures policy, not key primitives
  • Called workflows provide OpenTofu deployment pipelines — no CI/CD to build or maintain

Germane load is built through:

  • Security engineering: OpenBao policy authoring, dynamic secrets, and secrets lifecycle management
  • Applied cryptography: PKI chains, key rotation, and zero-trust secrets distribution
  • Zero-trust architecture: designing secrets access patterns that minimize blast radius

Team Capacity

  • Headcount: 1 platform engineer
  • Scale signal: Intentionally narrow — context should not grow to fill capacity; a third high-complexity domain would approach the cognitive ceiling