You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/product/fedramp.md
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,12 +35,26 @@ The FedRAMP environment is exclusively available to eligible organizations, incl
35
35
-**State and Local Governments**: Increasingly adopting FedRAMP to enhance data and system security.
36
36
-**Businesses Seeking Government Contracts**: Organizations pursuing federal contracts typically required to use FedRAMP authorized services.
37
37
38
-
### Workload Requirements
38
+
##Resources Separation Strategies
39
39
40
-
Only FedRAMP-related workloads can be hosted in the FedRAMP environment per program requirements. Organizations with both FedRAMP and commercial workloads must separate these environments:
40
+
FedRAMP and commercial workloads must be isolated from one another. You can achieve this in two ways:
41
41
42
-
-**FedRAMP workloads**: Use the dedicated FedRAMP environment
43
-
-**Commercial workloads**: Use our regular SaaS environment or [Self-Hosted](../self-hosted.md) option
42
+
### Isolation Delivered by Spacelift
43
+
44
+
To achieve full logical separation at the tenant level you need to create a second Spacelift account. The benefits of this approach include having a separate admin account, separate Identity Provider (IdP) configuration, separate audit and billing. This provides complete logical isolation between environments and ensures maximum security and compliance.
45
+
46
+
### Isolation Configured by The Customer
47
+
48
+
Spacelift supports strong multi-project isolation within a single tenant using [Spaces](../concepts/spaces/README.md), [RBAC](../concepts/authorization/README.md), [private worker pools](../concepts/worker-pools/README.md) and [Identity Provider (IdP) independent MFA](./security/mfa.md). Each Space functions as a self-contained boundary for stacks, policies, integrations, and contexts, allowing teams to operate independently without interference.
49
+
50
+
-**Spaces with role-based access control (RBAC) and resource isolation**. Each Space isolates stacks, policies, worker pools, contexts, and integrations. You can restrict which users or groups have access to each Space.
51
+
-**Separate Private Worker Pools** that run within your own infrastructure, enabling network and execution-level isolation. The temporary run state is encrypted so only your workers can decrypt it.
52
+
-**Separate customer-managed encryption keys (Bring Your Own Key / BYOK)** per worker pool or per integration for data-level separation, so Spacelift does not hold the decryption key.
53
+
-**Policy-driven governance**. Use Spacelift’s [policy types](../concepts/policy/README.md) (Login, Plan, Push, Approval, etc.) to enforce separation rules or guardrails over actions, role assignments, and allowed operations.
54
+
-**IdP-independent MFA (multi-factor authentication)**. You can enforce MFA policies that are not tied exclusively to a particular identity provider, applying additional security layers for users logging in through any IdP.
55
+
-**Integration with external secret managers**. You can use [pre-initialization hooks](../concepts/run/README.md#initializing) to fetch secrets directly from your own infrastructure, ensuring that sensitive data never leaves your environment and that Spacelift never has access to those secrets.
56
+
57
+
**Note that with this approach, commercial workloads must meet FedRAMP standards since they are hosted in the FedRAMP environment.**
0 commit comments