11---
22title : Pulumi Platform Security Whitepaper
3- meta_desc : A whitepaper of security topics and how they relate to the Pulumi Platform .
3+ meta_desc : Technical whitepaper covering Pulumi platform architecture, cryptographic security, operational commitments, and SOC 2 Type II compliance .
44---
55
66Last updated: December 2025
@@ -10,22 +10,21 @@ Last updated: December 2025
1010The Pulumi Cloud platform represents a comprehensive infrastructure-as-code delivery system designed to enable
1111organizations to define, deploy, and manage cloud infrastructure through declarative programming interfaces. This
1212document provides a detailed technical overview of the platform's architecture, security mechanisms, and operational
13- commitments, intended for engineering and security audiences evaluating the system's design and security posture.
13+ commitments. It is intended for engineering and security audiences evaluating the system's design and security posture.
1414
1515## High-Level Architecture
1616
1717### Platform Overview
1818
1919The Pulumi platform consists of two primary architectural components: a client-side command-line interface and a
2020multi-tenant cloud service infrastructure. These components work in concert to provide a complete infrastructure
21- management solution, with the command-line interface serving as the primary interaction point for end users and the
22- cloud service providing centralized state management, deployment orchestration, policy enforcement, and collaboration
23- features.
21+ management solution. The command-line interface serves as the primary interaction point for end users, while the cloud
22+ service provides centralized state management, deployment orchestration, policy enforcement, and collaboration features.
2423
25- On its core service layer the cloud service provides RESTful application programming interfaces for all platform
26- operations, while specialized components handle specific functional domains including deployment execution, resource
27- discovery, policy evaluation, workflow orchestration, and artificial intelligence-powered assistance. This separation of
28- concerns allows each component to scale independently based on demand patterns while maintaining service boundaries.
24+ On its core service layer the cloud service provides RESTful APIs for all platform operations, while specialized
25+ components handle specific functional domains including deployment execution, resource discovery, policy evaluation,
26+ workflow orchestration, and artificial intelligence-powered assistance. This separation of concerns allows each component
27+ to scale independently based on demand patterns while maintaining service boundaries.
2928
3029### Infrastructure Deployment Model
3130
@@ -42,23 +41,21 @@ segments with no direct internet access, communicating through internal service
4241storage resources are further isolated in dedicated network zones with restrictive access controls allowing only
4342authorized application connections.
4443
45- In fully managed cloud deployments the platform is deployed into distinct cloud provider tenants and virtual private
44+ In fully managed cloud deployments, the platform is deployed into distinct cloud provider tenants and virtual private
4645networks.
4746
4847### Core Service Components
4948
50- The platform's application programming interface service forms the central hub for all platform operations, handling
51- authentication, authorization, resource management, and coordinating with specialized subsystems. This service maintains
52- the primary data model representing organizations, projects, stacks, deployment history, and configuration state. It
53- implements comprehensive role-based access control ensuring that all operations respect organizational access policies
54- and user permissions.
49+ The platform's API service forms the central hub for all platform operations, handling authentication, authorization,
50+ resource management, and coordinating with specialized subsystems. This service maintains the primary data model
51+ representing organizations, projects, stacks, deployment history, and configuration state. It implements comprehensive
52+ role-based access control ensuring that all operations respect organizational access policies and user permissions.
5553
5654Deployment orchestration represents a critical functional domain within the platform. When users initiate infrastructure
5755operations, requests are queued and subsequently processed by specialized execution components. These components operate
5856in isolated execution environments, pulling the latest infrastructure code, applying the requested changes against cloud
59- provider application programming interfaces, and capturing the resulting state. Execution environments are ephemeral,
60- created for each operation and destroyed upon completion, ensuring isolation between deployments and preventing state
61- pollution across operations.
57+ provider APIs, and capturing the resulting state. Execution environments are ephemeral, created for each operation and
58+ destroyed upon completion, ensuring isolation between deployments and preventing state pollution across operations.
6259
6360Resource discovery and policy compliance functions are handled by specialized scanning and evaluation services. The
6461scanning component connects to cloud provider APIs to inventory existing infrastructure resources, building a
@@ -76,21 +73,21 @@ tooling and credentials, reducing job startup latency while maintaining isolatio
7673
7774The platform employs a multi-layered data storage strategy optimized for different access patterns and data
7875characteristics. Structured operational data including user accounts, organizations, resource metadata, deployment
79- history, and access control policies resides in a managed relational database service. The database is deployed in a
80- highly available configuration with automatic failover capabilities and read replicas to scale query workloads. All
81- connections to the database utilize transport layer security with enforced minimum protocol versions, and data at rest
82- is encrypted using provider-managed encryption services.
83-
84- Unstructured data including infrastructure state checkpoints, policy pack artifacts, and template repositories is stored
85- in object storage services. State checkpoints represent the most critical data in the system, as they contain the
86- complete state of managed infrastructure including resource identifiers, configuration values, and inter-resource
87- dependencies. These checkpoints are stored with versioning enabled, allowing recovery from accidental modifications or
88- deletions. Cross-region replication ensures that checkpoint data remains available even in the event of regional
89- outages.
76+ history, and access control policies resides in a managed relational database service. The platform deploys the database
77+ in a highly available configuration with automatic failover capabilities and read replicas to scale query workloads. All
78+ connections to the database utilize transport layer security with enforced minimum protocol versions, and the platform
79+ encrypts data at rest using provider-managed encryption services.
80+
81+ The platform stores unstructured data including infrastructure state checkpoints, policy pack artifacts, and template
82+ repositories in object storage services. State checkpoints represent the most critical data in the system, as they
83+ contain the complete state of managed infrastructure including resource identifiers, configuration values, and
84+ inter-resource dependencies. The platform stores these checkpoints with versioning enabled, allowing recovery from
85+ accidental modifications or deletions. Cross-region replication ensures that checkpoint data remains available even in
86+ the event of regional outages.
9087
9188Caching infrastructure provides performance optimization for frequently accessed data and reduces load on backend
92- storage systems. Session information, metadata caches, and query results are stored in managed cache clusters with
93- automatic scaling and failure detection. The caching layer implements appropriate cache invalidation strategies to
89+ storage systems. The platform stores session information, metadata caches, and query results in managed cache clusters
90+ with automatic scaling and failure detection. The caching layer implements appropriate cache invalidation strategies to
9491maintain consistency while maximizing hit rates.
9592
9693Search functionality is provided through a managed search cluster that indexes resource metadata, enabling fast
@@ -111,20 +108,21 @@ cloud state storage and self-managed options including local filesystems, object
111108Regardless of backend choice, the client implements consistent state locking mechanisms to prevent concurrent
112109modifications that could corrupt state data.
113110
114- The client communicates with the cloud service through RESTful application programming interfaces , with all requests
115- authenticated using access tokens. Request compression reduces bandwidth consumption for large payloads, while retry
116- logic handles transient network failures. Distributed tracing headers are injected into requests, enabling end-to-end
117- observability across the client-service boundary.
111+ The client communicates with the cloud service through RESTful APIs , with all requests authenticated using access
112+ tokens. Request compression reduces bandwidth consumption for large payloads, while retry logic handles transient network
113+ failures. Distributed tracing headers are injected into requests, enabling end-to-end observability across the
114+ client-service boundary.
118115
119116## Cryptographic Architecture
120117
121118### Encryption Key Hierarchy
122119
123120The platform implements a sophisticated three-tier key hierarchy that separates key management responsibilities and
124121enables flexible key rotation without requiring re-encryption of all data. At the top of the hierarchy are key
125- encryption keys, which are never stored unencrypted within the platform's data stores. These keys reside in external key
126- management services operated by cloud infrastructure providers or, for self-hosted deployments, in secure local key
127- storage protected by operating system access controls and hardware security modules when available.
122+ encryption keys, which are never stored unencrypted within the platform's data stores. For cloud deployments, these keys
123+ reside in external key management services operated by cloud infrastructure providers. For self-hosted deployments, they
124+ reside in secure local key storage protected by operating system access controls and hardware security modules when
125+ available.
128126
129127Data encryption keys form the second tier of the hierarchy. These symmetric keys are generated using cryptographically
130128secure external key management services and are used for the actual encryption of content. Data encryption keys are
@@ -273,8 +271,8 @@ Metrics collection captures time-series data about service health, resource util
273271business-level indicators. Metrics are aggregated at multiple granularities, from individual service instance metrics to
274272cluster-wide and system-wide aggregates. Dimensional metrics enable sophisticated queries that slice data across
275273multiple attributes such as service version, deployment environment, customer organization, and request characteristics.
276- Metric data feeds real-time dashboards displayed to operations teams and powers automated alerting based on threshold
277- violations or anomaly detection.
274+ This metric data feeds real-time dashboards displayed to operations teams. It also powers automated alerting based on
275+ threshold violations or anomaly detection.
278276
279277Structured logging captures detailed information about service operations, errors, and security-relevant events. Log
280278aggregation collects logs from all service instances and indexes them for full-text search and analytical queries. Log
@@ -398,7 +396,7 @@ reflects defense-in-depth principles with multiple layers of protection, ensurin
398396compromises overall security posture.
399397
400398The separation of key management responsibilities through hierarchical key architectures, support for customer-managed
401- encryption keys, and cryptographic binding between encryption layers demonstrates mature approach to data protection.
399+ encryption keys, and cryptographic binding between encryption layers demonstrates a mature approach to data protection.
402400Authentication and authorization mechanisms provide flexible integration with organizational identity providers while
403401maintaining strong security guarantees. Comprehensive audit logging and monitoring enable both real-time security event
404402detection and post-facto incident investigation.
0 commit comments