CIS Kubernetes Benchmark assessment
Automated scanning with kube-bench plus manual review of every deviation. We tell you which findings are genuinely risky and which are benchmark noise for your environment.
Cluster hardening, CIS benchmarks, admission control, supply-chain security, and runtime defense. CKS-led.
What we put our name behind
Every engagement is led by a Certified Kubernetes Security Specialist, with findings scoped to specific namespace, pod, and cluster resources — not generic "tighten RBAC" advice. Every control change we recommend ships with a tested rollback plan, so your platform team can apply it in production without flying blind.
Kubernetes gives you a lot of rope. Defaults are friendly to developers, not to security teams, and every managed offering (EKS, GKE, AKS) hands you a different subset of controls to configure. Most clusters we audit have at least one finding in the critical range within the first hour — over-permissive service accounts, exposed dashboards or legacy kubelet read-only ports on older nodes, unsigned images, or admission controllers that never got enabled.
We audit Kubernetes clusters the way a CKS is trained to: CIS Benchmark as the baseline, then layered controls for the gaps the benchmark doesn't cover. RBAC least-privilege, admission control via OPA/Gatekeeper or Kyverno, network policies, supply-chain hardening with Sigstore and SBOMs, runtime defense, and secrets management. We don't just hand you a scanner report — we hand you a prioritized remediation plan your platform team can actually execute.
Every engagement is senior-led and scoped in writing before kickoff.
Automated scanning with kube-bench plus manual review of every deviation. We tell you which findings are genuinely risky and which are benchmark noise for your environment.
Full audit of ClusterRoles, Roles, and their bindings. We flag every service account with more permissions than its workload needs, and give you a concrete plan to tighten them without breaking deployments.
Review of admission controllers, Pod Security Standards enforcement, and policy engines (OPA/Gatekeeper, Kyverno). If you don't have one, we'll help you pick and deploy it.
Every namespace should have default-deny. Most don't. We map actual workload communication, then generate NetworkPolicies that enforce it without breaking anything.
Image provenance, SBOM generation (Syft), signing with Sigstore/cosign, verification with admission policies, and dependency vulnerability scanning in CI.
Falco rules tuned to your workloads, eBPF-based runtime tooling evaluation, and incident-response playbooks for cluster-level compromises.
Review of Kubernetes Secrets usage, External Secrets Operator, sealed-secrets, and integration with cloud KMS. Includes a plan to eliminate plaintext secrets in manifests and Git.
Pipeline-integrated SAST, DAST, SCA, and IaC scanning. Secrets management. Security as a CI step, not a quarterly review.
Azure and AWS security architecture, IAM modernization, Zero Trust design, and least-privilege workload identity.
Manual, senior-led exploitation for internet-reachable web applications and REST/GraphQL APIs. First engagement: we find a high-severity vulnerability or you don’t pay.
A 30-minute call with a senior specialist. Written scope before kickoff. No SDRs.