Governance in Kestra Enterprise – Security and Control

Give your team secured, isolated environments and control over workflows with tenants, audit logs, secrets and more.

Governance – security and control

With tailored automation and precise access management, you can ensure compliance and efficiency at scale.

Assets

Use Assets in Kestra Enterprise to track workflow lineage and metadata. Manage resources like tables, files, and datasets across your data stack.

Audit Logs

Ensure compliance with Kestra Audit Logs. Track and monitor all user activities, flow executions, and system changes for security and governance.

Namespace Management

Secure your Kestra instance with Namespace Management. Configure isolated environments, manage secrets, and set Namespace-level plugin defaults.

Allowed & Restricted Plugins

Control plugin usage in Kestra Enterprise. Configure allowed and restricted plugins to enforce security policies and compliance standards.

Custom Blueprints

Create Custom Blueprints in Kestra Enterprise. Standardize workflows with private templates, promoting reuse and best practices across your organization.

Log Shipper

Centralize monitoring with Kestra Log Shipper. Export workflow and audit logs to Datadog, Splunk, Elastic, AWS S3, and other observability platforms.

Read-only Secret Manager

Enhance security with Read-Only Secret Managers in Kestra. Integrate external secret stores like Vault or AWS Secrets Manager in immutable mode.

Secrets Manager

Secure sensitive data in Kestra with External Secrets Managers. Integrate with AWS, Azure, Google Cloud, Vault, and more for robust secret management.

Secrets

Manage sensitive data securely in Kestra Enterprise. Create, use, and govern secrets within your workflows and integrations.

Tenants

Enable Multi-Tenancy in Kestra Enterprise. Isolate resources, flows, and users across different teams or projects within a single Kestra instance.

Unit Tests

Validate workflows with Unit Tests in Kestra Enterprise. Create test suites, mock tasks, and assert flow behavior to ensure reliability before production.

Worker Isolation

Enforce security with Worker Isolation in Kestra. Isolate execution environments, file systems, and processes for secure multi-tenant operations.

Was this page helpful?