Security Model

Note: This article was drafted by AI and reviewed by Erich. I plan to rewrite all explanatory content in my own words - these serve as placeholders to establish the documentation structure.

How BlumeOps handles network security, secrets, and access control.

Network Security: Tailscale

The foundational security decision is using tailscale as the network layer.

Zero Trust Networking

BlumeOps has no public IP addresses or port forwarding. All services are only accessible via Tailscale:

  • No attack surface from the public internet
  • Encrypted by default - WireGuard encryption for all traffic
  • Identity-based access - ACLs based on user/device identity, not IP addresses

Defense in Depth

Even within the tailnet, access is restricted:

Internet ──X──▶ Services (no public access)

Tailnet:
  Admin ────────▶ All services
  Member ───────▶ User-facing services only
  Homelab tag ──▶ NAS (for backups)

See tailscale for the full ACL matrix.

Secrets Management

Secrets follow a hierarchy:

Source of Truth: 1Password

All secrets originate in 1Password’s blumeops vault:

  • API keys, tokens, passwords
  • SSH keys and certificates
  • OAuth credentials

Kubernetes: External Secrets Operator

external-secrets syncs secrets from 1Password to Kubernetes:

1Password ──▶ 1Password Connect ──▶ ExternalSecret ──▶ K8s Secret

Services reference native Kubernetes Secrets; they don’t know about 1Password.

Ansible: op CLI

Ansible playbooks fetch secrets at runtime via op CLI:

- name: Fetch secret
  command: op item get <id> --fields password --reveal
  delegate_to: localhost

Secrets are held in memory as Ansible facts, never written to disk.

Git Repository

The repository is public. Secrets must never be committed:

  • .gitignore excludes sensitive patterns
  • Pre-commit hooks scan for potential secrets (TruffleHog)
  • All config files use references to secrets, not values

Access Control Philosophy

Principle of Least Privilege

Services and devices get minimum necessary access:

EntityAccess
Admin usersEverything
Member usersUser-facing services only
Homelab serversOnly what they need (NAS for backups)
K8s podsNo Tailscale access (use Caddy proxy)

Tagged Devices vs User Devices

Important Tailscale concept:

  • User devices (like gilbert) have user identity and inherit user ACLs
  • Tagged devices (like indri with tag:homelab) lose user identity

Don’t tag user devices - it breaks user-based access rules.

Authentication Patterns

Service-to-Service

Internal services use:

  • Kubernetes service discovery (no auth needed within cluster)
  • Tailscale identity for cross-host communication

User-to-Service

Users authenticate via:

  • Service-specific credentials (stored in 1Password)
  • Some services support Tailscale identity (future)

AI/Automation Access

Claude Code and automation use:

  • SSH keys for git operations
  • ArgoCD tokens for deployments
  • 1Password CLI for secret retrieval (requires user approval)

What’s Not Protected

Honest assessment of security boundaries:

  • Local network attacks - If someone is on your home WiFi, they could potentially access the NAS directly
  • Physical access - No disk encryption on servers (trade-off for reliability)
  • Supply chain - Container images from upstream registries
  • Operator error - Misconfigured ACLs or leaked credentials

The model assumes a trusted home network and focuses on protecting against internet-based attacks.