Platform Engineering (plt) owns the foundational infrastructure: identity, workspace governance, cloud platforms, and automation. This page covers naming patterns specific to platform engineering work.
For SaaS platforms that require a shared admin identity (rather than individual role-based access), we use:
prv-plt-admin-{vendor}@{domain}
Account Purpose prv-plt-admin-awsAWS root/admin account prv-plt-admin-glGitLab instance admin prv-plt-admin-tfTerraform Cloud org admin prv-plt-admin-datadogDatadog org admin prv-plt-admin-op1Password org admin
Shared admin accounts are owned by prv-plt-team (or the relevant sub-team).
Credentials stored in 1Password (or equivalent vault) with restricted access.
Access logged and reviewed quarterly.
Two-person rule for sensitive operations (especially prv-plt-admin-aws).
[ PRV ] PLT Admin – {Vendor Title}
The bracket prefix makes admin accounts visually distinct in directories.
Customer infrastructure fleet resources use the flt team identifier:
Resource Purpose prv-flt-monitoring-prdProduction fleet monitoring prv-flt-dns-mgmtFleet DNS management prv-flt-cert-rotationCertificate rotation automation prv-flt-backup-orchestratorBackup orchestration prv-flt-patch-mgmtPatch management automation
prv-flt-alerts-{system}[-{scope}][-{env}]
Alert Purpose prv-flt-alerts-monitoring-prdProduction fleet monitoring alerts prv-flt-alerts-dns-prdDNS health alerts prv-flt-alerts-cert-expiryCertificate expiry warnings
Platform Engineering manages the broadest set of role groups because PLT governs org-wide infrastructure:
Role Purpose prv-plt-role-wks-user-adminWorkspace user provisioning prv-plt-role-wks-groups-adminWorkspace groups management prv-plt-role-wks-drive-adminDrive/storage administration prv-plt-role-aws-idc-prd-adminAWS Identity Center production prv-plt-role-aws-org-adminAWS Organizations management
Role Purpose prv-plt-role-tf-cloud-adminTerraform Cloud org admin prv-plt-role-gl-org-adminGitLab instance administration prv-plt-role-op-vault-admin1Password vault management prv-plt-role-slack-adminSlack workspace admin prv-plt-role-zm-adminZoom account admin
Role Purpose prv-plt-role-wks-sd-create-adminShared Drive creation authority prv-plt-role-wks-sd-collab-managerCOLLAB drive root manager prv-plt-role-wks-sd-team-managerTEAM drive root manager prv-plt-role-wks-sd-strict-managerSTRICT drive root manager
Account Purpose prv-plt-auto-wks-syncDirectory sync automation prv-plt-auto-wks-gamGAM bulk operations runner prv-plt-auto-tf-planTerraform plan executor prv-plt-auto-gl-ci-runnerCI/CD runner identity prv-plt-auto-backup-agentBackup automation
Alert Group Source Purpose prv-plt-alerts-aws-prdAWS CloudWatch Production infrastructure alerts prv-plt-alerts-wks-adminGoogle Workspace Admin event alerts prv-plt-alerts-tf-prdTerraform Cloud Plan/apply failures prv-plt-alerts-gl-infraGitLab Runner health, storage alerts
Domain Type Pattern Purpose Platform/infra *.{org}.cloudGitLab SM, registries, runners, charts Sandbox/community *.{brand}.devEphemeral previews, workshops, OSS demos
.dev is HSTS-preloaded. Keep it for sandbox/community.
Don’t host production GitLab on .dev.
Scope cookies per host (avoid Domain= to parent).
Wildcard certs acceptable for *.{org}.cloud.