Skip to content

Commit db9051d

Browse files
committed
update data plane to control plane communication information
1 parent dc8b89a commit db9051d

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

docs/reference/permissions.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,10 @@ NGINX Gateway Fabric uses a **split-plane architecture** where control and data
1818

1919
This split requires different security contexts because:
2020

21-
- **Control plane** needs Kubernetes API access to manage resources but never handles user traffic
21+
- **Control plane** needs Kubernetes API access to manage data plane deployments but never handles user traffic
2222
- **Data plane** processes user traffic but never accesses Kubernetes APIs directly
23-
- Both planes communicate securely via TLS, eliminating the need for shared filesystem access or elevated privileges
23+
- **Secure communication**: Control plane sends NGINX configuration to data plane via gRPC over mTLS (port 8443)
24+
- **Isolated deployment**: Each plane runs in separate pods with independent security contexts
2425

2526
## Control Plane
2627

@@ -160,4 +161,4 @@ The split-plane architecture enables a defense-in-depth security model:
160161
- **Read-only root**: Prevents runtime modifications to container filesystems
161162
- **Ephemeral storage**: Writable data uses temporary volumes, not persistent storage
162163
- **Least privilege RBAC**: Control plane gets only required Kubernetes permissions; data plane needs no RBAC
163-
- **Secure inter-plane communication**: TLS-encrypted gRPC between control and data planes
164+
- **Secure inter-plane communication**: mTLS-encrypted gRPC (TLS 1.3+) between control and data planes

0 commit comments

Comments
 (0)