- What does a Kubernetes security assessment cover?
- Cluster configuration, RBAC policies, network policies, secrets management, pod security standards, container image security, ingress and egress controls, CI/CD pipeline security and Helm chart review. We test for container escape, lateral movement and privilege escalation across both cloud-managed and self-hosted environments.
- What is container escape testing?
- Container escape testing verifies that a compromised container cannot break out of its isolation to access the host system or other containers. We test for privileged containers, dangerous capabilities, host namespace sharing, host path mounts and kernel exploit paths.
- Do you test cloud-managed Kubernetes services like EKS, GKE and AKS?
- Yes. We test Amazon EKS, Google GKE and Azure AKS configurations including cloud-specific IAM integration, managed node group security, control plane access controls and cloud-native networking. Cloud-managed clusters have different attack surfaces than self-hosted Kubernetes.
- How do RBAC misconfigurations lead to cluster compromise?
- Overly permissive ClusterRoles, wildcard permissions, excessive service account privileges and unscoped default tokens allow an attacker who compromises a single pod to escalate to cluster-admin. We audit every Role, ClusterRole, RoleBinding and ClusterRoleBinding and map the full escalation graph.
- Should we test our CI/CD pipeline as part of a Kubernetes assessment?
- Yes. The CI/CD pipeline is the supply chain for your cluster. If an attacker compromises your build pipeline, they can inject malicious code into container images deployed to production. We test pipeline access controls, image signing, registry security, build environment isolation and deployment credential management.