RBAC for Infrastructure Automation
Role-Based Access Control (RBAC) is table stakes for any SaaS product. Most teams implement it for their dashboards — who can view incidents, who can invite members, who can change billing.
But what happens when your platform can execute actions against production infrastructure?
Suddenly, RBAC isn't just a governance checkbox. It's a safety-critical system.
The 5-Persona Model
After working with dozens of engineering teams, we landed on a five-persona RBAC model that balances flexibility with safety:
Viewer
Can see incidents, timelines, and postmortems. Cannot take any action. Perfect for stakeholders, product managers, and executives who need visibility without risk.
Responder
Can acknowledge incidents, add comments, and manually trigger pre-approved remediation actions. This is your typical on-call engineer during an incident.
Operator
Everything a Responder can do, plus the ability to configure remediation policies, set up integrations, and approve automated actions. Think of this as your senior SRE.
Admin
Full control over the organization: member management, billing, API key rotation, and all operational capabilities.
Owner
The organization creator. Has all Admin permissions plus the ability to delete the organization and transfer ownership.
Why This Matters for Automation
Consider a scenario where Operyn's AI diagnoses a memory leak and suggests scaling the pod count from 3 to 10.
With flat permissions, any team member could approve that action. But scaling 3x has cost implications and could mask the underlying issue.
With Operyn's RBAC:
- A Viewer sees the suggestion but can't act
- A Responder can execute it manually if pre-approved
- An Operator can approve it and set guardrails (e.g., max scale = 8)
- An Admin can configure whether this class of action requires approval at all
The Principle of Least Privilege
Every automated action in Operyn respects the principle of least privilege. Remediation policies define:
- Which actions are allowed
- Who can approve them
- Maximum blast radius (e.g., "never restart more than 2 pods simultaneously")
- Whether simulation mode is required first
This isn't just good security practice — it's how you build trust in automation. When your team knows that guardrails exist, they're far more comfortable letting the system act autonomously.