Skip to content
Kubernetes 13 min read

Kubernetes Security Services: A Buyer's Guide

Most Kubernetes security assessments are CIS Benchmark scanner output with a logo. A real audit tests what the scanner can't see: RBAC abuse chains, pod escape paths, and lateral movement across namespaces. This is how to tell the difference.

Who this is for

You're an engineering leader or security lead evaluating Kubernetes security vendors—either running your first audit or replacing a vendor whose work left you doubting they actually understand your cluster.

Here's the hard truth: most Kubernetes security assessments are CIS Benchmark scanner output with a logo slapped on. A real audit tests what the scanner can't see: RBAC abuse chains, pod escape paths, lateral movement across namespaces, and misconfigured admission controllers that let anyone run privileged workloads.

This guide tells you what separates actual security work from checkbox compliance.

Diagram

1. What a Kubernetes security assessment should actually cover

The CIS Kubernetes Benchmark is table stakes. But if that's all your vendor runs, you're getting the low-hanging fruit and missing the hard stuff.

A real assessment covers:

  • CIS controls as a baseline, not the whole story.
  • RBAC review: can a developer escalate to cluster-admin? Can service accounts in namespace A access data in namespace B? Can anyone bind a ClusterRole to themselves?
  • Admission control: are your webhook validators actually validating? Can you bypass them? Are Pod Security Standards (via Pod Security Admission) actually blocking what you think they are? (PSPs were removed in Kubernetes 1.25.)
  • Network policies: do they exist? Do they actually enforce what you think? (Most don't.)
  • Supply chain: image provenance, signed containers, scanning in your pipeline, runtime verification.
  • Runtime behavior: what are your pods actually doing? Can they escape their containers? Can they move laterally?

2. The CIS Benchmark trap

CIS is necessary. But it's not sufficient, and vendors who treat it as sufficient are selling you compliance theater.

CIS catches obvious misconfigurations: kubelet API exposed, etcd unencrypted, no network policies at all. Good. But it won't find:

  • An overprivileged service account that can list secrets across the cluster.
  • A misconfigured validating webhook that silently fails open.
  • Pods running with securityContext.runAsUser: 0 because someone didn't template it correctly.
  • A legacy namespace with no Pod Security Standard enforced.

CIS is a tool. A vendor who runs only CIS is a junior engineer with a scanner. A vendor who treats CIS as the foundation and then digs deeper is doing actual security work.

3. Certifications worth paying attention to

Three certs matter for K8s security: CKS (Certified Kubernetes Security Specialist), CKAD (Certified Kubernetes Application Developer), and CKA (Certified Kubernetes Administrator).

  • CKS: hands-on security exam. If your vendor's lead engineer has it, they've proven they can work in a live cluster and solve real problems fast.
  • CKAD: tests understanding of Kubernetes primitives from an app developer's perspective. Useful for engineers who review manifests.
  • CKA: foundational Kubernetes knowledge. Table stakes for anyone claiming to do K8s work.

A vendor with CKS engineers is rare. That's worth money. A vendor with no certifications is selling templates or running scanner output.

4. Red flags in vendor proposals

Watch for these:

  • Scanner only. "We'll run Trivy / Falco / Aqua and send you a report." That's a tool, not an assessment.
  • No mention of RBAC. If they don't talk about service account abuse chains, they're not doing real security work.
  • No hands-on cluster access. They can't assess what they can't see.
  • "Proprietary tools" with no detail. You can't fix what you don't understand. Demand transparency.
  • Fixed methodology regardless of your setup. EKS, AKS, GKE, and self-hosted all have different threat surfaces. A vendor who runs the same playbook for all of them is lazy.
  • No mention of threats unique to your environment. Multi-tenancy? Compliance requirements? CI/CD integration? They should ask.

5. What the deliverables should include

A PDF report is the bare minimum. What you actually need:

  • Remediation manifests you can apply directly: RBAC fixes, network policies, admission policies.
  • Falco rules (or equivalent runtime monitoring) tuned to your environment, not generic templates.
  • A rollout plan. Some findings are critical. Some are nice-to-have. A good vendor prioritizes and phases them.
  • Training or documentation. You need to understand what you're fixing and why, not just follow orders.

6. Managed Kubernetes platforms have different security surfaces

EKS, AKS, GKE, and self-hosted clusters have different threat models and different controls.

  • EKS: AWS IAM integration is critical. IRSA (IAM Roles for Service Accounts) is your lever. Most assessments miss it.
  • AKS: Azure AD/Entra integration. Pod Identity or Workload Identity. Network policies may be disabled by default.
  • GKE: Workload Identity, Config Connector. Autopilot clusters have opinionated security defaults; you need to know what they trade off.
  • Self-hosted: You own all the layers. That's more risk and more control.

A vendor who doesn't ask which platform you're on is guessing.

7. Prepare your cluster properly

Before an audit, give your vendor the right access and scope:

  • Create a service account with read-only cluster access. Don't give them your AWS / Azure / GCP credentials.
  • Define scope. All namespaces? Crown-jewel applications? A staging environment?
  • Agree on timeline and impact. Some tests (pod escape attempts, admission controller fuzzing) are intrusive. Plan for them.
  • Identify blind spots in advance. "We can't let you touch production etcd" or "The vendor runs on an airgapped network." Surface these early.

8. Questions to ask before signing

Before engagement:

  • Who's running the audit? What are their certifications and experience?
  • Will they test RBAC abuse chains and pod escape paths?
  • What tools will they use? Can we see the Falco rules or scanning templates in advance?
  • Will we get remediation code (YAML manifests) or just a report?
  • How do you handle Kubernetes platform differences (EKS vs AKS vs GKE)?
  • What happens after the assessment? Do you offer follow-up or training?
  • How long does the assessment take? What's the timeline from kickoff to report?

Field observations

RBAC is where most breaches live. We've walked into clusters where a developer's service account could read all secrets in all namespaces. No attacker needed a zero-day—they just needed a compromised pod in staging. CIS didn't catch it because CIS doesn't review service account permissions in detail.

Admission controllers are often set to fail open. You implement a validating webhook to enforce signed images, but if the webhook is down or slow, most clusters default to allowing the request. We've seen this in EKS, AKS, and GKE—the webhook silently fails, and unverified images run anyway. A good assessment tests this.

Network policies are incomplete by default. Teams add network policies to block traffic between namespaces, but they often forget to deny traffic within a namespace. A compromised pod can still move sideways to the database pod in the same namespace.

The short version

A Kubernetes security assessment worth paying for goes beyond CIS scanning. It should test RBAC abuse chains, admission control failures, network policy gaps, and pod escape paths. Look for vendors with hands-on experience (CKS certified), platform-specific knowledge (EKS vs AKS vs GKE), and deliverables that include remediation code—not just a report. Avoid vendors who run scanner-only assessments, offer fixed methodologies regardless of your setup, or can't explain their approach in detail. The difference between compliance theater and actual security is whether you walk away understanding your risks and knowing how to fix them.

Want a Kubernetes audit that goes beyond the scanner?

CKS-led, with RBAC abuse testing, admission control review, network policy validation, and remediation manifests — not a PDF. Includes a verification retest within 60 days.