Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 444

GitOps Security

What is GitOps Security?

GitOps SecuritySecurity practices for GitOps workflows, where the declarative desired state of infrastructure and applications is stored in Git and reconciled into production by an automated controller.


GitOps relies on Git as the single source of truth and uses tools like Argo CD or Flux to continuously reconcile clusters with that state. This shifts security focus to the Git repository, identity of committers, pull-request controls, and the GitOps controller itself. Key practices include branch protection, signed commits and tags, CODEOWNERS, mandatory reviews, secret-free repositories (Sealed Secrets, External Secrets, SOPS, Vault integrations), policy-as-code (OPA Gatekeeper, Kyverno), image signature verification (Cosign), restricted controller permissions, and audit-log shipping. GitOps Security also requires preventing the controller from running unreviewed manifests, malicious Helm charts, or unsigned container images. Misconfigurations let attackers escalate from a single PR merge to full cluster compromise.

Examples

  1. 01

    Argo CD configured to only reconcile from a signed, protected main branch with Cosign image verification.

  2. 02

    Sealed Secrets used so encrypted manifests can sit safely in Git.

Frequently asked questions

What is GitOps Security?

Security practices for GitOps workflows, where the declarative desired state of infrastructure and applications is stored in Git and reconciled into production by an automated controller. It belongs to the Application Security category of cybersecurity.

What does GitOps Security mean?

Security practices for GitOps workflows, where the declarative desired state of infrastructure and applications is stored in Git and reconciled into production by an automated controller.

How does GitOps Security work?

GitOps relies on Git as the single source of truth and uses tools like Argo CD or Flux to continuously reconcile clusters with that state. This shifts security focus to the Git repository, identity of committers, pull-request controls, and the GitOps controller itself. Key practices include branch protection, signed commits and tags, CODEOWNERS, mandatory reviews, secret-free repositories (Sealed Secrets, External Secrets, SOPS, Vault integrations), policy-as-code (OPA Gatekeeper, Kyverno), image signature verification (Cosign), restricted controller permissions, and audit-log shipping. GitOps Security also requires preventing the controller from running unreviewed manifests, malicious Helm charts, or unsigned container images. Misconfigurations let attackers escalate from a single PR merge to full cluster compromise.

How do you defend against GitOps Security?

Defences for GitOps Security typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for GitOps Security?

Common alternative names include: Secure GitOps.

Related terms