Azure Container Platform Security: 6-Wk Assessment

BlakYaks limited

BlakYas provide a detailed assessment of the customers approach to container and Kubernetes security to improve the platforms security posture covering AKS, ARO, Docker, Rancher etc.

Enterprise container and Kubernetes platforms require a new approach when designing and maintaining the right security posture. An Azure-hosted enterprise container platform (ECP) that must be secure, compliant and stable often results in new technologies, processes, policies, controls, governance, methods and security operations frameworks.

This assessment reviews container security at multiple layers including but not limited to:

  • How the Azure container and chosen container orchestration platform is configured versus best practice including both Azure Kubernetes Service (AKS) and Azure Red Hat OpenShift (ARO)
  • How role based access controls are being used to manage container platform security
  • How privileged identity management tools are being deployed to managed identities
  • Which native Azure tools are being used and how (e.g. Azure Policy, Defender, Sentinel)
  • Whether industry standards such as CIS benchmarks are being used to manage ongoing compliance (e.g. with Azure Policy)
  • How the supply chain for container deployment is being monitored for security threats
  • How 3rd party tools are being used and whether they are being used effectively
  • Whether or not SOC (security operations centre) processes have been adjusted

BlakYaks will assess how ready the customer is to secure the enterprise container platform and manage its security posture through its lifecycle. We will review existing plans, architectures, designs, operational frameworks and thinking to identify any key gaps that exist that would compromise platforms scalability and security. We will look for opportunity to optimise and will enhance the security posture and its compliance to standards, controls and policies on an ongoing basis.

The engagement will culminate in a detailed report with a table of focus areas categorised into technology, process, policy, controls and people with key recommendations and priorities clearly defined in terms of business benefit and risk mitigation.

https://store-images.s-microsoft.com/image/apps.27214.a8924f38-cb1d-4e2f-a535-478c25135141.499465b7-c755-4630-b330-62f666d5dc33.c230baa9-a2f3-4c41-bf96-c95ad26bf7c5
/staticstorage/9fa6ec0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.27214.a8924f38-cb1d-4e2f-a535-478c25135141.499465b7-c755-4630-b330-62f666d5dc33.c230baa9-a2f3-4c41-bf96-c95ad26bf7c5
/staticstorage/9fa6ec0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.61669.a8924f38-cb1d-4e2f-a535-478c25135141.004aa69a-edbe-4201-96b0-438aaa0b1505.3b2bbfb9-b629-4066-b850-4f263f568fe9
https://store-images.s-microsoft.com/image/apps.4934.a8924f38-cb1d-4e2f-a535-478c25135141.004aa69a-edbe-4201-96b0-438aaa0b1505.4b8ed2b6-edc4-454e-a98c-b2f2b4e008ba
https://store-images.s-microsoft.com/image/apps.38478.a8924f38-cb1d-4e2f-a535-478c25135141.004aa69a-edbe-4201-96b0-438aaa0b1505.85d856fc-d5db-4d27-b782-f247d505b96c