Jump to content

Connect SuperML | Leeroopedia MCP: Equip your AI agents with best practices, code verification, and debugging knowledge. Powered by Leeroo — building Organizational Superintelligence. Contact us at founders@leeroo.com.

Principle:Apache Airflow Production Hardening

From Leeroopedia


Knowledge Sources
Domains Security, Kubernetes
Last Updated 2026-02-08 00:00 GMT

Overview

A security hardening pattern for production Airflow deployments covering RBAC, secret management, network policies, and pod-level isolation.

Description

Production Hardening encompasses security best practices for Airflow in Kubernetes: RBAC roles scoped to minimum required permissions, Fernet encryption for sensitive data, Kubernetes Secrets for credentials, network policies for pod isolation, and KubernetesExecutor for per-task pod isolation. The Helm chart includes templates for all security resources with sensible defaults.

Usage

Apply production hardening when deploying Airflow in any environment beyond development. Enable network policies, use external secret management, configure RBAC, and consider KubernetesExecutor for workload isolation.

Theoretical Basis

Defense in Depth:

  1. RBAC: Least-privilege roles for pod launching, log reading, job management
  2. Secrets: Fernet key, webserver secret key, database credentials encrypted at rest
  3. Network: Pod-to-pod communication restricted by network policies
  4. Isolation: KubernetesExecutor runs each task in a separate pod
  5. Audit: OpenTelemetry tracing for request tracking

Related Pages

Implemented By

Page Connections

Double-click a node to navigate. Hold to expand connections.
Principle
Implementation
Heuristic
Environment