> ## Documentation Index
> Fetch the complete documentation index at: https://docs.controlplane.com/llms.txt
> Use this file to discover all available pages before exploring further.

# Org (Organization)

> Organizations are the top-level isolation boundary in Control Plane. Contains all resources including GVCs, workloads, policies, secrets, and user access controls.

## Overview

An organization is a strictly isolated bounded context that encapsulates all the resources managed by Control Plane. These kinds of resources include [domains](/reference/domain), [images](/reference/image), [workloads](/concepts/workload), [GVCs](/reference/gvc), [users](/reference/user), [groups](/reference/group), [service accounts](/reference/serviceaccount), etc.

A physical organization (e.g., Acme) can create more than one ‘org’, although it is optional. Reasons for
doing so might be to provide absolute isolation between subsidiaries for example.

<Note>An org name is **globally unique**</Note>

As a user of Control Plane, you will be a member of at least one organization and have access to manage the org resources listed below:

**Click on any of the links below to learn more about each specific resource:**

* **Access Control**
  * [Audit Context](/reference/auditctx)
  * [Audit Trail](/core/audittrail)
  * [Groups](/reference/group)
  * [Policies](/reference/policy)
  * [Service Accounts](/reference/serviceaccount)
  * [Users](/reference/user)
* [Agents](/reference/agent)
* [Cloud Accounts](/reference/cloudaccount)
* [Domains](/reference/domain)
* [GVC (Global Virtual Cloud)](/reference/gvc)
  * [Identities](/reference/identity)
  * [Volume Sets](/reference/volumeset)
  * [Workloads](/concepts/workload)
* [Images](/reference/image)
* [Locations](/reference/location)
* [Logs](/core/logs)
* [Quotas](/reference/quota)
* [Secrets](/reference/secret)

## Cross-GVC Communication

Workloads in different GVCs within the same org can communicate with each other using [internal firewall rules](/reference/workload/firewall#internal). Configure the internal firewall with `same-org` or `workload-list` to allow specific cross-GVC access.

## Reference

Visit the [org reference](/reference/org) page.
