European · Sovereign · Open Source

On-Premises Kubernetes.
Hardware-Rooted Trust.

A fully open-source platform for deploying and operating secure Kubernetes infrastructure — built by and for European public sector organisations.

100% Open Source
Zero Cloud Dependencies
NIS2 Compliant Architecture
EU Data Sovereignty

Built for organisations that serve the public

Otobots is designed for organisations where digital sovereignty, compliance, and operational control are not optional.

Governments

National and regional government agencies requiring sovereign infrastructure under full jurisdictional control.

Municipalities

Local governments modernising their IT without surrendering data to external cloud providers.

Education

Universities, research institutions, and school districts that need secure, reproducible compute environments.

Utilities & Critical Infrastructure

Energy, water, and transport organisations subject to NIS2 and IEC 62443 requirements.

Healthcare

Hospitals and health services handling sensitive patient data under strict GDPR and national regulations.

Public Enterprises

State-owned companies and public-sector IT service providers delivering shared infrastructure.

The Platform

Four integrated components — from bare metal to running workloads — all declarative, all auditable, all open source.

01

Controller

Automation Hub

An Ansible Controller with SemaphoreUI providing a web-based interface for orchestrating all platform operations. PostgreSQL-backed, Nginx-fronted, deployable on AlmaLinux/Rocky, or Debian/Ubuntu.

  • Web-based playbook management
  • Multi-inventory support
  • Declarative state management
  • Docker & Terraform/OpenTofu tooling
02

Clusterlust

Kubernetes Deployment

Production-grade Kubernetes clusters deployed through Kubespray with structured inventory management. Supports control plane, worker, and bastion node topologies across any hypervisor.

  • Kubespray-based deployment
  • Multi-environment inventories
  • Software Integrations
  • Proxmox Hypervisor (from Austria)
03

Zero Trust

Hardware-Rooted Security

A hardware-anchored zero-trust compute platform with offline Root CA, HSM-backed secrets, TPM-sealed credentials, and network-bound disk encryption. No persistent secrets anywhere.

  • NitroKey HSM 2 (made in Germany)
  • TPM 2.0 measured boot
  • OpenBao secrets management
  • Offline Root CA ceremonies
04

GitOps

Continuous Delivery

FluxCD-driven GitOps with Kustomize overlays for infrastructure components. OpenBao and tofu-controller managed declaratively from Git — the single source of truth.

  • FluxCD continuous reconciliation
  • Kustomize base + overlay pattern
  • OpenTofu controller integration
  • Cluster-scoped infrastructure as code

Layered Trust Architecture

Security is not a feature — it is the structure. Every layer enforces cryptographic boundaries anchored in hardware.

Offline Root

Root Certificate Authority

Physically secured, HSM-stored private key. Powered on only for controlled key ceremonies. Compromise of any online system cannot reach the root of trust.

Tier 0

Hardware Root of Trust

Online Intermediate CA, NitroKey HSM, TPM 2.0 sealing, OpenBao secrets engine, Tang network-bound disk encryption. The trust anchor for all downstream services.

Tier 1

Virtualisation Layer

Stateless hypervisors with no persistent secrets. VM lifecycle managed declaratively. Cloud-init ephemeral identity injection. Hypervisors are untrusted compute fabric.

Tier 2

Ephemeral Compute — Kubernetes

LUKS2 encrypted disks, network-bound unlock, short-lived certificates, single-use tokens. A stolen VM cannot decrypt outside the trusted network boundary.

Hardware-Rooted Secrets

The master key never leaves the HSM. The HSM PIN never leaves the TPM. No secret ever exists as copiable data on any filesystem.

1

NitroKey HSM 2

Open-hardware security module manufactured in Berlin. Generates and stores non-extractable cryptographic keys. The root wrapping key for all platform secrets lives here — and only here.

2

TPM 2.0

The HSM PIN is sealed inside the server's TPM, bound to measured boot state (PCR values). If firmware, bootloader, or kernel are tampered with, the PIN is never released.

3

OpenBao

Secrets management engine (MPL 2.0 fork of Vault). Encrypts all data with a master key unwrapped by the HSM via PKCS#11. Zero-touch unseal on every boot — no operator intervention.

Threat Conventional Risk Otobots Mitigation
Physical server theft Key compromise Hardware-sealed keys, encrypted disks
VM disk export Data extraction Network-bound unlock required
Hypervisor compromise Secret exposure No persistent secrets stored
Boot chain tampering Rootkit persistence TPM measured boot, PCR policy
CA compromise Full trust collapse Only intermediate affected; root offline

Compliance by Architecture

Not a checklist — a structural design that satisfies regulatory requirements through engineering decisions.

NIS2

Risk management, cryptographic controls, supply chain resilience, incident containment, deterministic rebuild capability.

IEC 62443

Defence in depth, hardware root of trust, zone and conduit separation, least privilege cryptographic identity.

ISO 27001

HSM-rooted key hierarchy, automated key lifecycle, recovery key distribution, encrypted secrets at rest.

DORA

ICT risk management, HSM-backed encryption, recovery key distribution, automated unseal and resilience.

SOC 2

Role-based access policies, TLS 1.3 enforcement, tamper-evident audit logging on every secret access.

GDPR

Data sovereignty through local hardware trust. No third-party processors for key material. Article 17 via physical HSM destruction.

Fully Open Source. No Lock-In.

Every component is open source. No proprietary runtime dependencies. No per-node licenses. No metered API calls.

OpenBao MPL 2.0 — Linux Foundation
Kubernetes Apache 2.0 — CNCF
Kubespray Apache 2.0 — CNCF
Ansible GPL 3.0 — Red Hat
FluxCD Apache 2.0 — CNCF
NitroKey HSM Open Hardware — Berlin, DE
OpenTofu MPL 2.0 — Linux Foundation
SemaphoreUI MIT — Community

Digital Sovereignty Means Physical Control

The root of trust is a physical device held by your organisation — not a cloud provider's managed service. Secret material never transits third-party infrastructure. Key management policies are set by you, not by a provider's terms of service. No data processing agreements required for the secrets management layer. No sub-processor notifications for key material.

Take control of your infrastructure

Otobots is open source and available today on Codeberg. Explore the code, read the documentation, deploy on your terms.