You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: Update executive summary with NSA/CISA hardening guide references
- Add NSA/CISA Kubernetes Hardening Guide to compliance alignment section
- Add Kubernetes STIG to compliance framework list
- Add direct link to NSA/CISA implementation documentation in next steps
- Add specific NSA/CISA alignment to risk mitigation strategy table
- Update compliance achievement levels with more specific metrics
- Expand next steps section with additional resources
Signed-off-by: Aaron Lippold <[email protected]>
The Kubernetes API Approach fully satisfies these standards, while interim approaches require documented risk acceptance.
57
+
The Kubernetes API Approach achieves 90% alignment with these standards (with near 100% alignment once distroless support is complete), while interim approaches require documented risk acceptance.
56
58
57
59
### 3. Investment Protection
58
60
@@ -70,7 +72,8 @@ This staged approach ensures continuous security coverage while minimizing techn
70
72
|-------------|---------------------|
71
73
| Privileged Access for Scanning | Implemented least-privilege model with temporary tokens (15-minute lifespan) |
72
74
| Configuration Errors | Provided ready-to-use scripts and Helm charts with security controls pre-configured |
73
-
| Compliance Documentation | Included comprehensive compliance mapping and security analysis for auditors |
75
+
| Compliance Documentation | Included comprehensive compliance mapping (NIST, CIS, NSA/CISA, DoD) and security analysis for auditors |
76
+
| NSA/CISA Hardening Alignment | Detailed implementation guidance for all NSA/CISA Kubernetes controls with approach-specific compliance ratings |
74
77
| Distroless Container Coverage | Multi-approach strategy with planned migration to universal solution |
75
78
76
79
## Executive Recommendation
@@ -86,8 +89,9 @@ This phased implementation delivers immediate security benefits while positionin
86
89
## Next Steps for Decision Makers
87
90
88
91
1. Review the [Security Compliance Analysis](../security/compliance/index.md) for detailed regulatory alignment
89
-
2. Examine the [Enterprise Integration Analysis](../overview/enterprise-integration-analysis.md) for adoption considerations
90
-
3. Share the [Approach Decision Matrix](../approaches/decision-matrix.md) with your security and DevOps teams
91
-
4. Direct implementation teams to the [Quickstart Guide](../quickstart-guide.md)
3. Explore the [Enterprise Integration Analysis](../overview/enterprise-integration-analysis.md) for adoption considerations
94
+
4. Share the [Approach Decision Matrix](../approaches/decision-matrix.md) with your security and DevOps teams
95
+
5. Direct implementation teams to the [Quickstart Guide](../quickstart-guide.md)
92
96
93
-
For security and compliance inquiries, see our detailed [Risk Analysis](../security/risk/index.md).
97
+
For security and compliance inquiries, see our detailed [Risk Analysis](../security/risk/index.md) and [Compliance Documentation](../security/compliance/index.md).
0 commit comments