Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Exposure Policy

Rules

This document defines how services are exposed to users and the network requirements for each exposure category.

Exposure Categories

Public

  • Definition: Services reachable from the internet.
  • DNS: Must resolve to the Public IP of the platform.
  • Auth: Must enforce SSO/MFA at the Ingress layer.
  • TLS: Must use valid, publicly trusted certificates.

Internal

  • Definition: Services reachable only from LAN or VPN.
  • DNS: Must resolve to a Private IP (RFC1918).
  • Auth: Must enforce SSO at the Ingress layer.
  • TLS: Should use certificates (internal or public CA).

VPN-Only

  • Definition: Services reachable only from VPN clients.
  • DNS: Must resolve to a Private IP (RFC1918) only on VPN resolvers.
  • Auth: Must enforce SSO at the Ingress layer.
  • TLS: Should use certificates (internal or public CA).

Management

  • Definition: Administrative endpoints (SSH, Git, control plane consoles).
  • DNS: Must resolve to management-only records or private IPs.
  • Auth: Must enforce MFA and privileged access controls.
  • TLS: Must use certificates (internal or public CA).

Mandatory Ingress Behavior

CategoryAllowed IngressAllowed Source NetworksDNS Resolution
PublicPublic Ingress onlyInternetPublic IP
InternalInternal Ingress onlyLAN + VPNPrivate IP
VPN-OnlyInternal Ingress onlyVPN onlyPrivate IP (VPN resolvers only)
ManagementManagement endpoints onlyAdmin LAN + VPNPrivate IP / management records

Mandatory Auth Requirements

CategoryAuthenticationAuthorization
PublicSSO + MFA at IngressGroup-based access (IdP)
InternalSSO at IngressGroup-based access (IdP)
VPN-OnlySSO at IngressGroup-based access (IdP)
ManagementMFA + privileged accessAdmin-only groups, audited access

Naming Rules

  • All services MUST use the *.risu.tech domain.
  • Internal service names MUST match their public counterparts (if they exist) to ensure a seamless user experience.
  • The platform uses Split-Horizon DNS to ensure that app.risu.tech resolves to the correct IP based on the client’s network location.

Traffic Constraints

  • Public Ingress MUST NOT route traffic to backends tagged as “Internal.”
  • Internal Ingress MUST drop any traffic originating from outside the Home Network Boundary.
  • No direct port-forwarding (NAT) to backend services is allowed. All traffic must pass through an Ingress controller.