Stella Ops Suite Documentation

Stella Ops Suite is a centralized, auditable release control plane for non-Kubernetes container estates. It orchestrates environment promotions, gates releases using reachability-aware security and policy, and produces verifiable evidence for every decision.

Stella is designed for teams who deploy containers via Docker/Compose, hosts/VMs, and scripted automation and need certifiable security + auditable releases without building a bespoke governance pipeline.


What Stella delivers

Evidence-grade release governance (outside Kubernetes)

  • Environment promotions (Dev -> Stage -> Prod) with explicit policy, approvals, and change control.
  • Digest-first release identity: deployments are tracked by immutable OCI digests so “what is deployed where” is unambiguous.
  • Deterministic decision records: every gate decision is explainable (“why blocked?”) and replayable.

Reachability-aware security decisioning

  • Deep scanning produces SBOM + findings + reachability and hybrid reachability evidence.
  • VEX-first decisioning with consensus and conflict handling across issuers (SBOM/VEX are part of the evidence chain, not a side export).
  • Policy-as-code with deterministic evaluation and traceable outcomes.

Verifiability, attestability, and audit export

  • Evidence packets / decision capsules: hashable, immutable bundles that capture inputs, verdicts, and approvals.
  • Attestations (DSSE/in-toto, predicates for SBOM/VEX/verdict/reachability; optional Sigstore flows where configured).
  • Audit exports for compliance review, incident response, and forensic reconstruction.

Offline-first, sovereign operation

  • Built for air-gapped and restricted environments: local databases, offline kits/snapshots, and deterministic replay.
  • Regional crypto profiles (eIDAS/FIPS/GOST/SM and related plugin architecture) to avoid compliance lock-in.

Toolchain-agnostic integrations

  • Integrates with common SCM/CI/registries/secrets managers through connectors and plugins.
  • Works alongside existing pipelines: scan-on-build, gate-on-promotion, re-evaluate on advisory updates.

Core differentiators (the “why Stella” set)

These concepts appear throughout the docs and are the suite’s anchor points:

  • Signed, replayable risk verdicts: decisions can be re-run deterministically from the same evidence.
  • Decision capsules: evidence is packaged for audit, not scattered across logs and screenshots.
  • Reachability with portable proofs: exploitability is evidenced, not asserted.
  • Smart-diff / semantic risk delta: focus on what materially changed between releases.
  • Unknowns as first-class state: uncertainty is tracked and budgeted, not hidden.
  • Non-Kubernetes-first: orchestration and evidence for Compose/hosts/agentless targets as a primary use case.
  • Digest-first release identity: immutable artifacts, immutable accountability.

For exhaustive capability detail (including planned items), use the Feature Matrix referenced below.


Two levels of documentation

  • High-level (canonical): curated guides in docs/*.md.
  • Detailed (reference): deep dives under docs/** (module dossiers, architecture notes, API contracts/samples, runbooks, schemas).
    Entry point: docs/technical/README.md.

This documentation set is intentionally consolidated and does not maintain compatibility stubs for old paths.


Start here

Product understanding

GoalOpen this
Understand the suite quicklyoverview.md
Capability cardskey-features.md
Full capability matrixFEATURE_MATRIX.md
Product visionproduct/VISION.md
Roadmap (priorities + definition of “done”)ROADMAP.md

Getting started

GoalOpen this
First run and basic workflowsquickstart.md
Ingest advisories (Concelier + CLI)CONCELIER_CLI_QUICKSTART.md
Console (Web UI) operator guideUI_GUIDE.md
Offline / air-gap operationsOFFLINE_KIT.md

Architecture

GoalOpen this
Architecture: high-level overviewARCHITECTURE_OVERVIEW.md
Architecture: full reference mapARCHITECTURE_REFERENCE.md
Architecture: user flows (UML)technical/architecture/user-flows.md
Architecture: module matrixtechnical/architecture/module-matrix.md
Architecture: data flowstechnical/architecture/data-flows.md
Architecture: schema mappingtechnical/architecture/schema-mapping.md
Release Orchestration dossiermodules/release-orchestrator/architecture.md

Development and operations

GoalOpen this
Develop plugins/connectorsPLUGIN_SDK_GUIDE.md
Security deployment hardeningSECURITY_HARDENING_GUIDE.md
VEX consensus and issuer trustVEX_CONSENSUS_GUIDE.md
Vulnerability Explorer guideVULNERABILITY_EXPLORER_GUIDE.md
SBOM determinism guidesboms/DETERMINISM.md
Engineering standards (for implementers)code-of-conduct/CODE_OF_CONDUCT.md
Testing standards (for QA/automation)code-of-conduct/TESTING_PRACTICES.md

Detailed indexes

  • Technical index (everything): docs/technical/README.md
  • End-to-end workflow flows: docs/flows/
  • Module dossiers: docs/modules/
  • API contracts and samples: docs/api/
  • Architecture notes / ADRs: docs/technical/architecture/, docs/technical/adr/
  • Operations and deployment: docs/operations/
  • Air-gap workflows: docs/modules/airgap/guides/
  • Security deep dives: docs/security/
  • Benchmarks and fixtures: docs/benchmarks/, docs/assets/
  • Product advisories: docs/product/advisories/

License and notices

  • Project license (BUSL-1.1 + Additional Use Grant): LICENSE
  • Third-party notices: NOTICE.md
  • Legal and licensing index: docs/legal/README.md
  • Full dependency inventory: docs/legal/THIRD-PARTY-DEPENDENCIES.md
  • Compatibility guidance: docs/legal/LICENSE-COMPATIBILITY.md
  • Cryptography compliance: docs/legal/crypto-compliance-review.md

Design principles (non-negotiable)

  • Offline-first: core operations must work in restricted/air-gapped environments.
  • Deterministic replay: same inputs yield the same outputs (stable ordering, canonical hashing).
  • Evidence-linked decisions: every decision links to concrete evidence artifacts.
  • Digest-first identity: releases are immutable OCI digests, not mutable tags.
  • Pluggable integrations: connectors and steps are extensible; the core evidence chain stays stable.