!!! info "Directory Inventory" See the Security Directory Inventory for a complete listing of files and resources in this directory.
This section outlines security considerations for deploying and using the Secure Kubernetes Container Scanning Helm charts. Security is a core design principle of our solution, with all charts implementing a least-privilege model, short-lived credentials, and other security best practices.
Our Helm charts implement a layered security architecture:
-
Core Security Layer (scanner-infrastructure)
- Least-privilege RBAC implementation
- Short-lived access tokens
- Namespace isolation
- Service account permissions
-
Operational Security Layer (common-scanner)
- Secure script execution
- Result data protection
- Failure handling
-
Approach-Specific Security Controls
- Different security models for each scanning approach
- Approach-specific hardening options
The security documentation is organized into the following sections:
- Best Practices: Recommended security practices for deploying and using the Helm charts
- RBAC Hardening: Detailed guidance for securing RBAC configurations
- Risk Assessment: Security risk assessment for each Helm chart component
This approach offers the strongest security posture:
- Minimal Attack Surface: Uses only Kubernetes API exec
- No Additional Containers: Maintains container isolation
- Clean Security Boundary: Clear separation between scanner and target
This approach has specific security considerations:
- Temporary Attack Surface Increase: Ephemeral debug container
- Process Namespace Consideration: Debug container can access target processes
- Limited Duration: Container exists only during scanning
This approach has the highest security impact:
- Persistent Attack Surface Increase: Sidecar container remains with pod
- Process Namespace Sharing: Breaks container isolation boundary
- Resource Consumption: Additional container in every pod
To implement a secure scanning solution:
- Review the Security Best Practices for deployment recommendations
- Follow the RBAC Hardening guide for proper access control
- Understand the Risk Assessment for each component
- Choose the appropriate scanning approach based on your security requirements
- Implement the recommended security controls for your environment