Jump to content

Connect Leeroopedia MCP: Equip your AI agents to search best practices, build plans, verify code, diagnose failures, and look up hyperparameter defaults.

Principle:Apache Airflow Production Hardening

From Leeroopedia


Knowledge Sources
Domains Security, Kubernetes
Last Updated 2026-02-08 00:00 GMT

Overview

A security hardening pattern for production Airflow deployments covering RBAC, secret management, network policies, and pod-level isolation.

Description

Production Hardening encompasses security best practices for Airflow in Kubernetes: RBAC roles scoped to minimum required permissions, Fernet encryption for sensitive data, Kubernetes Secrets for credentials, network policies for pod isolation, and KubernetesExecutor for per-task pod isolation. The Helm chart includes templates for all security resources with sensible defaults.

Usage

Apply production hardening when deploying Airflow in any environment beyond development. Enable network policies, use external secret management, configure RBAC, and consider KubernetesExecutor for workload isolation.

Theoretical Basis

Defense in Depth:

  1. RBAC: Least-privilege roles for pod launching, log reading, job management
  2. Secrets: Fernet key, webserver secret key, database credentials encrypted at rest
  3. Network: Pod-to-pod communication restricted by network policies
  4. Isolation: KubernetesExecutor runs each task in a separate pod
  5. Audit: OpenTelemetry tracing for request tracking

Related Pages

Implemented By

Page Connections

Double-click a node to navigate. Hold to expand connections.
Principle
Implementation
Heuristic
Environment