Skip to content

Commit 6e8488f

Browse files
self-hosted-releasesjmfontaine
authored andcommitted
Update workloads co-location instructions in FedRAMP environment
1 parent 238450b commit 6e8488f

File tree

1 file changed

+18
-4
lines changed

1 file changed

+18
-4
lines changed

docs/product/fedramp.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,26 @@ The FedRAMP environment is exclusively available to eligible organizations, incl
3535
- **State and Local Governments**: Increasingly adopting FedRAMP to enhance data and system security.
3636
- **Businesses Seeking Government Contracts**: Organizations pursuing federal contracts typically required to use FedRAMP authorized services.
3737

38-
### Workload Requirements
38+
## Resources Separation Strategies
3939

40-
Only FedRAMP-related workloads can be hosted in the FedRAMP environment per program requirements. Organizations with both FedRAMP and commercial workloads must separate these environments:
40+
FedRAMP and commercial workloads must be isolated from one another. You can achieve this in two ways:
4141

42-
- **FedRAMP workloads**: Use the dedicated FedRAMP environment
43-
- **Commercial workloads**: Use our regular SaaS environment or [Self-Hosted](../self-hosted.md) option
42+
### Isolation Delivered by Spacelift
43+
44+
To achieve full logical separation at the tenant level you need to create a second Spacelift account. The benefits of this approach include having a separate admin account, separate Identity Provider (IdP) configuration, separate audit and billing. This provides complete logical isolation between environments and ensures maximum security and compliance.
45+
46+
### Isolation Configured by The Customer
47+
48+
Spacelift supports strong multi-project isolation within a single tenant using [Spaces](../concepts/spaces/README.md), [RBAC](../concepts/authorization/README.md), [private worker pools](../concepts/worker-pools/README.md) and [Identity Provider (IdP) independent MFA](./security/mfa.md). Each Space functions as a self-contained boundary for stacks, policies, integrations, and contexts, allowing teams to operate independently without interference.
49+
50+
- **Spaces with role-based access control (RBAC) and resource isolation**. Each Space isolates stacks, policies, worker pools, contexts, and integrations. You can restrict which users or groups have access to each Space.
51+
- **Separate Private Worker Pools** that run within your own infrastructure, enabling network and execution-level isolation. The temporary run state is encrypted so only your workers can decrypt it.
52+
- **Separate customer-managed encryption keys (Bring Your Own Key / BYOK)** per worker pool or per integration for data-level separation, so Spacelift does not hold the decryption key.
53+
- **Policy-driven governance**. Use Spacelift’s [policy types](../concepts/policy/README.md) (Login, Plan, Push, Approval, etc.) to enforce separation rules or guardrails over actions, role assignments, and allowed operations.
54+
- **IdP-independent MFA (multi-factor authentication)**. You can enforce MFA policies that are not tied exclusively to a particular identity provider, applying additional security layers for users logging in through any IdP.
55+
- **Integration with external secret managers**. You can use [pre-initialization hooks](../concepts/run/README.md#initializing) to fetch secrets directly from your own infrastructure, ensuring that sensitive data never leaves your environment and that Spacelift never has access to those secrets.
56+
57+
**Note that with this approach, commercial workloads must meet FedRAMP standards since they are hosted in the FedRAMP environment.**
4458

4559
## Platform Features and Limitations
4660

0 commit comments

Comments
 (0)