Some interesting insights on how to get the most of your pentest: from selecting the right vendor to proper project management.
Container platform security audit
Every container has many components that can pose security risks and vulnerabilities.
No matter what platform you use, it’s vital to secure your cloud and container workloads. Our security check expertise covers containerization platforms like:
At the beginning of the project, we will collect all the input and agree on the scope of the audit/pentest.
We keep clients informed in course of the project, providing regular status updates and immediate notifications for critical findings.
A kick-off meeting to agree on the scope, inputs and communication
Cloud pentest (1-3 weeks, depending on the scope)
The final report that highlights the identified container security issues
We employ a combination of well-recognised cloud security guidelines, automated tools and manual verifications.
- CIS Benchmarks
- NIST Application Container Security Guide
- NSA Kubernetes Hardening Guidance
- … and others
- Inspection tools for containers based on CIS benchmarks
- Various open source tooling used where applicable
All outputs of the tools are being triaged with false positives being removed by security experts.
Check how our container security audit report looks like
Please contact us, and we will send you a sample report of the container security audit.
Please tell us what you are looking for, and we will happily support you in that. Feel free to use our contact form or contact us directly.