Operate
Security Checklist
Review the minimum controls required before exposing Duck to shared users or sensitive data.
Use this as a release gate before exposing the platform to shared users or sensitive data.
Identity and auth
- OIDC is configured for user-facing environments, or the non-OIDC choice is explicitly justified
- API keys are limited to service or automation use cases
- local-only auth conveniences are disabled outside development
- principal and group ownership is documented
Secrets and encryption
ENCRYPTION_KEYis set from a managed secret source- local JWT secrets are not reused in production
- secret values are not committed into config files or example artifacts
- secret rotation and recovery paths are known to operators
Access policy
- grants follow least privilege
- row filters are in place where tenant or geography scoping is required
- column masks cover sensitive fields that should not be returned verbatim
- policy changes are verified through the real query path before release
Runtime posture
- the correct listener addresses are exposed
- rate limits are configured for the intended load profile
- proxy trust is enabled only when a trusted reverse proxy is actually in front of the service
- remote compute fallback is configured intentionally rather than implicitly
Operations
- health and metrics endpoints are monitored
- distributed compute rollout uses fallback intentionally
- upgrade and drift procedures are documented for the team
- health and metrics endpoints are connected to real alerting
Warning Signs
- a shared environment depends on development auth shortcuts
- one admin API key is reused broadly across people and systems
- policy changes are applied without query-path verification
- a published product has no clear owner, request path, or freshness expectation
Next Steps
Access DesignModel least-privilege access.
Distributed ComputeRoll out workers safely.
Policy VerificationTest policies through real queries.