BYOC data-flow attestation
Cross-boundary data flow for Veto BYOC.
Data-flow attestation
Veto BYOC separates the Plaw plane from the customer plane.
Customer plane
Your Kubernetes cluster runs the operator, PDP/server, dashboard, storage, policies, decisions, approvals, Slack/webhook configuration, and support-bundle redaction. Customer policy content, decision rows, tool-call arguments, agent IDs, end-user IDs, Slack content, compiled NL prompts, env vars, and secrets remain here.
Plaw plane
Plaw supplies signed software artifacts, license verification, and optional anonymous telemetry collection. Plaw does not have inbound network access to the customer plane and does not assume roles, impersonate service accounts, or hold cross-account IAM.
Only cross-boundary payloads
- License heartbeat:
instance_uuid,license_id,decision_count_30d,sdk_version,operator_version,timestamp. - Optional anonymous telemetry when explicitly enabled by the customer.
- Customer-initiated image/chart/SBOM/signature downloads from GHCR and release artifacts.
- Optional customer-initiated support bundle after local redaction, excluding inline policy content, decisions, tool args, env vars, and Secrets.
Air-gapped mode disables heartbeat and telemetry and validates the offline license JWT from a mounted customer secret/file.