Security & Compliance

Infrastructure security you can stake a clearance on.

Infrastructure security you can stake a clearance on.

Built for organizations where security isn't optional. From air-gapped on-prem deployments to highly regulated cloud environments, Orion meets you where your compliance requirements are.

A work team around the desk

Security architecture

Meeting your framework. Not the other way around.

Meeting your framework. Not the other way around.

Meeting your framework. Not the other way around.

Air-gapped deployment support

Orion runs fully disconnected from the internet. All container images can be pre-pulled and hosted in private registries. No phone-home telemetry. Ideal for classified, SCIF, and high-security manufacturing environments.

Air-gapped deployment support

Orion runs fully disconnected from the internet. All container images can be pre-pulled and hosted in private registries. No phone-home telemetry. Ideal for classified, SCIF, and high-security manufacturing environments.

Air-gapped deployment support

Orion runs fully disconnected from the internet. All container images can be pre-pulled and hosted in private registries. No phone-home telemetry. Ideal for classified, SCIF, and high-security manufacturing environments.

Zero-trust network model

Workload-to-workload communication is encrypted and authenticated via mTLS. No implicit trust between services. Namespace isolation enforces hard boundaries between tenants, projects, and teams.

Zero-trust network model

Workload-to-workload communication is encrypted and authenticated via mTLS. No implicit trust between services. Namespace isolation enforces hard boundaries between tenants, projects, and teams.

Zero-trust network model

Workload-to-workload communication is encrypted and authenticated via mTLS. No implicit trust between services. Namespace isolation enforces hard boundaries between tenants, projects, and teams.

RBAC & audit logging

Fine-grained role-based access control with immutable audit logs. Every API call, deployment, and configuration change is recorded with user identity, timestamp, and affected resources. SIEM-compatible export via syslog or webhook.

RBAC & audit logging

Fine-grained role-based access control with immutable audit logs. Every API call, deployment, and configuration change is recorded with user identity, timestamp, and affected resources. SIEM-compatible export via syslog or webhook.

RBAC & audit logging

Fine-grained role-based access control with immutable audit logs. Every API call, deployment, and configuration change is recorded with user identity, timestamp, and affected resources. SIEM-compatible export via syslog or webhook.

Secret management integration

Native integrations with HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault. Secrets are injected at runtime and never stored in container images or version control. Automatic rotation supported.

Secret management integration

Native integrations with HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault. Secrets are injected at runtime and never stored in container images or version control. Automatic rotation supported.

Secret management integration

Native integrations with HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault. Secrets are injected at runtime and never stored in container images or version control. Automatic rotation supported.

Your identity provider. Our authorization.

Orion handles authorization only — never authentication. Connect any NextAuth-compatible identity provider: Active Directory, Okta, Google Workspace, AWS Cognito, or SAML-based SSO. Orion consumes the JWT and enforces role-based access. Your IdP stays in control. Orion never stores credentials.

Your identity provider. Our authorization.

Orion handles authorization only — never authentication. Connect any NextAuth-compatible identity provider: Active Directory, Okta, Google Workspace, AWS Cognito, or SAML-based SSO. Orion consumes the JWT and enforces role-based access. Your IdP stays in control. Orion never stores credentials.

Your identity provider. Our authorization.

Orion handles authorization only — never authentication. Connect any NextAuth-compatible identity provider: Active Directory, Okta, Google Workspace, AWS Cognito, or SAML-based SSO. Orion consumes the JWT and enforces role-based access. Your IdP stays in control. Orion never stores credentials.

Supply chain resilience

Supply chain resilience

One compromised package shouldn't take down everything.

One compromised package shouldn't take down everything.

Supply chain attacks on Kubernetes tooling are accelerating. Compromised security scanners, poisoned container images, malicious dependencies — the attack surface is growing. Orion's containerized architecture contains the blast radius by design. Namespaces enforce hard isolation between workloads. A compromised package stays in its container. Your other workloads keep running.

Supply chain attacks on Kubernetes tooling are accelerating. Compromised security scanners, poisoned container images, malicious dependencies — the attack surface is growing. Orion's containerized architecture contains the blast radius by design. Namespaces enforce hard isolation between workloads. A compromised package stays in its container. Your other workloads keep running.

Namespace isolation by default

Every workload runs in a hardened container with strict namespace boundaries. Lateral movement between workloads requires explicit, audited permissions — not just network access.

No shared execution context

Workloads don't share process space, filesystem, or runtime. A compromised dependency can't reach secrets, credentials, or data belonging to other workloads.

Air-gapped option eliminates the surface entirely

For organizations where no external attack vector is acceptable, Orion runs fully disconnected. No package registry calls. No phone-home telemetry. No external dependencies at runtime.

Evaluating Orion's security posture? Start in an isolated dev environment — full platform, no production impact.

Vulnerability disclosure

Found a vulnerability?

Found a vulnerability?

We take security reports seriously. If you discover a vulnerability in Orion or any Juno infrastructure, please report it through our coordinated disclosure process. We commit to acknowledging reports within 24 hours and providing a remediation timeline within 72 hours.

We take security reports seriously. If you discover a vulnerability in Orion or any Juno infrastructure, please report it through our coordinated disclosure process. We commit to acknowledging reports within 24 hours and providing a remediation timeline within 72 hours.

→ 24-hour acknowledgement guarantee

→ 24-hour acknowledgement guarantee

→ No legal action for good-faith researchers

→ No legal action for good-faith researchers

→ CVE coordination with MITRE available

→ CVE coordination with MITRE available

Architecture

The orchestration layer handles scheduling, resource allocation, and lifecycle management across every substrate — so your team doesn't have to.

Security isn't a feature. It's the foundation.

Orion deploys fully on-prem with no external network dependencies, no cloud telemetry, and no data leaving your environment. When the threat surface is everywhere, your infrastructure shouldn't be.