Save this case study in PDF
Download PDFClient
The client is a prominent Government IT Center responsible for various critical IT developments supporting national infrastructure across multiple governmental departments. Handling highly sensitive information and providing essential IT services, the center ensures the efficient and secure operation of national government infrastructure.
Background
In an engagement with a Government IT Center (EU Country), Iterasec conducted an onsite, comprehensive security audit of their OpenShift container platform, which underpins critical national infrastructure operations. Given the sensitivity and scale of the systems, identifying and mitigating potential vulnerabilities was paramount to ensuring operational resilience, regulatory compliance, and protection against advanced threat actors.
The Challenge
The Government IT Center needed an in-depth and complete security audit of their OpenShift container infrastructure. Key requirements included:The Solution
Iterasec assigned one of its lead penetration testers — a recognized expert in container security and OpenShift — to conduct the comprehensive onsite audit. The approach included:
-
Conducted on-site security testing
strictly from the client’s secured workstations to comply with internal protocols.
-
Reviewed OpenShift infrastructure
including access controls, workload configurations, network policies, API server settings, and GitOps practices (ArgoCD).
-
Identified critical vulnerabilities
such as lack of segregation of duties, absence of MFA, outdated ArgoCD deployment, and permissive container settings.
-
Detected additional technical risks
including default-permitted privileged containers, unsecured volume mounts exposing sensitive data, excessively privileged service account tokens, unnecessary cluster-admin roles, and insufficient logging configurations.
-
Developed an actionable remediation plan
based on CIS Kubernetes Benchmarks and OpenShift best practices to address identified vulnerabilities and strengthen the environment.
The Outcome
Following Iterasec recommendations, the Government IT Center achieved major improvements:Conclusion
This audit demonstrated that even highly secured environments managing national infrastructure must proactively identify and mitigate evolving container security threats. Each technical finding highlighted the interconnected risks across identity management, runtime security, and infrastructure configuration. Through targeted remediation, the Government IT Center substantially elevated its security posture, ensuring greater resilience against sophisticated adversaries while maintaining compliance with national cybersecurity mandates.