Access Control
Tag-based network access control in Baseguard
Baseguard uses a tag-based access control system to define what traffic is allowed between nodes in your network. Combined with tags, ACLs enable fine-grained zero-trust security.
Overview
Access control in Baseguard works by:
- Tags — Labels assigned to nodes (e.g.,
production,database) - Network Rules — Rules defining allowed traffic between tagged groups
Key Concepts
Default Allow
New organizations start with a default "allow all" rule for immediate connectivity. Traffic is denied unless a matching allow rule exists — rule order does not matter, if any rule matches the traffic, it is permitted. Remove the default "allow all" rule once you've added your own to enforce a zero-trust model. See Network Rules for details.
Tag-Based Rules
Rules match traffic by tags, not IP addresses:
Source: [admin]
Destination: [database]
Protocol: TCP
Ports: 5432
→ Nodes tagged "admin" can reach nodes tagged "database" on port 5432Getting Started
Tags
Create and assign tags to organize your nodes.
Network Rules
Define rules to control traffic between nodes.
Quick Example
Scenario
You have:
- Admin laptops
- Web servers
- Database servers
Tags
admin-laptop → [admin]
web-server-1 → [web]
web-server-2 → [web]
db-server → [database]ACL Rules
# Admins can SSH to everything
[admin] → [] : TCP/22
# Web servers can reach databases
[web] → [database] : TCP/5432
# Web servers can reach each other
[web] → [web] : TCP/8080Result
- Admin laptops can SSH to any server
- Web servers can query databases
- Web servers can communicate with each other
- Database servers cannot initiate connections to web servers
Best Practices
- Start restrictive: Begin with minimal access, add rules as needed
- Use meaningful tags:
web-frontendoverserver-1 - Document rules: Add descriptions explaining the purpose
- Regular review: Audit rules periodically for unused or overly broad permissions
See Also
- Tags — Creating and managing tags
- Network Rules — ACL rule configuration
- API Reference — Manage ACLs and tags programmatically
- Zero Trust — Security principles