Skip to content

Commit fec4578

Browse files
committed
docs: Update executive summary with NSA/CISA hardening guide references
- Add NSA/CISA Kubernetes Hardening Guide to compliance alignment section - Add Kubernetes STIG to compliance framework list - Add direct link to NSA/CISA implementation documentation in next steps - Add specific NSA/CISA alignment to risk mitigation strategy table - Update compliance achievement levels with more specific metrics - Expand next steps section with additional resources Signed-off-by: Aaron Lippold <[email protected]>
1 parent 59a8e2d commit fec4578

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

docs/overview/executive-summary.md

+10-6
Original file line numberDiff line numberDiff line change
@@ -48,11 +48,13 @@ This solution strongly aligns with key regulatory requirements:
4848

4949
- **NIST SP 800-190** (Container Security)
5050
- **CIS Kubernetes Benchmarks**
51+
- **NSA/CISA Kubernetes Hardening Guide**
5152
- **DoD 8500.01** and DISA Container Platform SRG
53+
- **Kubernetes STIG** (Security Technical Implementation Guide)
5254
- **PCI DSS 4.0** container security requirements
5355
- **HIPAA** infrastructure security guidelines
5456

55-
The Kubernetes API Approach fully satisfies these standards, while interim approaches require documented risk acceptance.
57+
The Kubernetes API Approach achieves 90% alignment with these standards (with near 100% alignment once distroless support is complete), while interim approaches require documented risk acceptance.
5658

5759
### 3. Investment Protection
5860

@@ -70,7 +72,8 @@ This staged approach ensures continuous security coverage while minimizing techn
7072
|-------------|---------------------|
7173
| Privileged Access for Scanning | Implemented least-privilege model with temporary tokens (15-minute lifespan) |
7274
| Configuration Errors | Provided ready-to-use scripts and Helm charts with security controls pre-configured |
73-
| Compliance Documentation | Included comprehensive compliance mapping and security analysis for auditors |
75+
| Compliance Documentation | Included comprehensive compliance mapping (NIST, CIS, NSA/CISA, DoD) and security analysis for auditors |
76+
| NSA/CISA Hardening Alignment | Detailed implementation guidance for all NSA/CISA Kubernetes controls with approach-specific compliance ratings |
7477
| Distroless Container Coverage | Multi-approach strategy with planned migration to universal solution |
7578

7679
## Executive Recommendation
@@ -86,8 +89,9 @@ This phased implementation delivers immediate security benefits while positionin
8689
## Next Steps for Decision Makers
8790

8891
1. Review the [Security Compliance Analysis](../security/compliance/index.md) for detailed regulatory alignment
89-
2. Examine the [Enterprise Integration Analysis](../overview/enterprise-integration-analysis.md) for adoption considerations
90-
3. Share the [Approach Decision Matrix](../approaches/decision-matrix.md) with your security and DevOps teams
91-
4. Direct implementation teams to the [Quickstart Guide](../quickstart-guide.md)
92+
2. Examine our [NSA/CISA Kubernetes Hardening Guide](../security/compliance/nsa-cisa-hardening.md) implementation
93+
3. Explore the [Enterprise Integration Analysis](../overview/enterprise-integration-analysis.md) for adoption considerations
94+
4. Share the [Approach Decision Matrix](../approaches/decision-matrix.md) with your security and DevOps teams
95+
5. Direct implementation teams to the [Quickstart Guide](../quickstart-guide.md)
9296

93-
For security and compliance inquiries, see our detailed [Risk Analysis](../security/risk/index.md).
97+
For security and compliance inquiries, see our detailed [Risk Analysis](../security/risk/index.md) and [Compliance Documentation](../security/compliance/index.md).

0 commit comments

Comments
 (0)