Kubernetes Security

We help you make your Kubernetes environment secure

scudo_k8s

Why is the security of Kubernetes environments important?

Gartner estimates that over 85% of organizations will run applications in container environments by 2025. In this context, Kubernetes has become the standard for orchestrating and scaling applications.

To make its adoption easier for developers, the default configuration of Kubernetes focuses on being easy-to-use at the expense of its security posture, which does not match the needs of production environments.

What we do

Lockless helps you in adopting and securing your Kubernetes environments at 360 ° by evaluating specific strategies and policies based on your needs. Our process is based on the guidelines defined by the Center for Internet Security (CIS) and allows you to make your environments CIS-compliant in the shortest time possible.

Main considered topics

A

Custom configuration of master and worker nodes

The definition of ad-hoc configuration files for master nodes and worker nodes is essential to enable the essential security plugins and to improve the observability of the state of the cluster.

B

Trustworthiness and verification of container images

Many attacks exploit compromised container images as entry-points. Therefore, it is essential to configure the environment to verify the source and the integrity of the deployed images.

C

Container privilege management through Pod Security Policy

Containers are run by ad-hoc users called Service Accounts. By associating Pod Security Policies to Service Accounts, it is possible to limit the privileges of each container following the least privilege principle.

D

Network Policies to control the communication in the cluster

The default Kubernetes configuration does not impose any limit on the communication between containers running in the cluster. The definition of Network Policies allows you to protect and isolate attacks on specific containers.

E

Access control through Role Based Access Control

Kubernetes offers several access control mechanisms, including RBAC, which allows to establish the privileges of each user and block any operation that goes beyond its operational duties.

F

Benchmarks to validate the security posture over time

Kubernetes has been designed to support the continuous evolution of applications. In this scenario, it is essential to integrate security benchmarks into release procedures to ensure a secure configuration of the cluster over time.

Our customers

About us

Lockless is an innovative startup focused on high-profile IT consulting and research and development for public and private entities. We have multiple years of experience in successfully applying the results and methodologies of scientific research to the industry in areas such as Cyber Security, High Performance Computing, Cloud Computing, and simulation.

Get in touch

Book now for an introductory call or write to us to get more information. We work with both medium to large end clients and as a team with other consulting firms.