lattice.dev/v1alpha1

Lattice Documentation

Secure service graph and AI workload platform. Bilateral service agreements, compile-time policy enforcement, and defense-in-depth security from network to kernel.

Getting Started

Infrastructure

Workloads

Security

Architecture

Bilateral agreements — both sides must agree for traffic to flow
Defense in depth — Cilium L4, Istio L7, Tetragon kernel enforcement
Cedar compile-time auth — security overrides authorized before deployment
AI-native — model serving, batch jobs, GPU scheduling via Volcano
Self-managing clusters — pivot model, no single point of failure
FIPS 140-2 — rustls + aws-lc-rs cryptography