Cyberlands.io - API Penetration Testing

Kubernetes Penetration Testing

Docker, Kubernetes & OpenShift Penetration Testing
What is K8S penetration testing?

In cloud-native reality, pentest makes its way as a security assessment where we audit Kubernetes users, API limits, authentication, and other Kubernetes policies making sure your team could deploy and run code securely.
A. Kubernetes Configuration Audit
We deliver a technical audit of Kubernetes \ OpenShift cluster configuration, particularly in the following ten areas:
  1. Authentication
  2. Authorisation
  3. Secrets Management
  4. Cryptography
  5. Multi-tenancy & Pod security
  6. Protection for privileged accounts
  7. Protection for cluster networking
  8. Vulnerability management
  9. Monitoring and logging
  10. Management and integration
B. Pipeline Analysis
As a second step, we complement Kubertenes security assessment by analysing neighbouring areas:
  1. Image Security (dockerfile)
  2. Application Security checks (pipeline)
  3. Leaked Secrets and Tokens (including Kubernetes configmap)
C. Kubernetes Security Framework
There we design a cybersecurity framework for a Kubernetes cluster that works, making controls on three core layers that delivers results:
  1. Built-in security controls of Docker, Docker Swarm, Kubernetes or OpenShift.
  2. Using your existing security controls (SIEM, Identity Providers, Vaults and Privileged Access Management) or any Kubernetes security tools.
  3. Drafting RFPs to support tendering and procurement of specialized OpenShift and Kubernetes security suites.

Our Cases on K8S Penetration Testing

Industrial Solutions

Preserving firm's reputation
Protecting patient's data
Defending intellectual property
Ensuring continuity of supply
Enabling digital services

How We Differ

  • Focus
    We maintain a laser focus on API Penetration Testing and related disciplines
  • Digital Experience
    We provide Customer Portal access with all findings and recommendation for each customer - the portal could be connected to customers' systems like Jira
  • Professionalism
    We employ experts with 5+ years of experience delivered security assessments for UK, EU, US, Hong Kong and Israeli companies