Security first, not security as afterthought
StrixHQ enforces security best practices through admission control, supply chain validation, and compliance evidence.
Security Principles
Default Deny
Policies in enforce mode. What is not explicitly allowed is blocked. No post-deploy cleanup.
Defense in Depth
Security on multiple layers: CI gates, admission policies, runtime security context. Failure on one layer stops deployment.
Audit Trail
Every deployment logs policy decisions, SBOM, and image provenance. Compliance evidence without manual work.
Security Controls
Supply Chain Security
CI LayerTrivy scans images for CVEs. SBOM generation with Syft. Only images from whitelisted registries.
- Vulnerability scanning - Trivy scans for critical/high CVEs
- SBOM generation - Syft generates bill of materials per image
- Registry restrictions - Only ghcr.io, docker.io, registry.k8s.io
- Base image tracking - Know which base images are used
- License compliance - SPDX format SBOMs
Admission Control Policies
KyvernoHard guardrails via Kyverno. Admission webhooks block non-compliant resources before they are deployed.
- No privileged containers - hostNetwork, hostPID, hostIPC forbidden
- Non-root enforcement - runAsNonRoot: true required
- Resource limits - CPU/memory requests and limits mandatory
- Health probes - Liveness and readiness probes required
- Label compliance - Required labels for ownership tracking
Runtime Security Context
Pod-levelPods run with minimal privileges. Read-only filesystem where possible, dropped capabilities.
- runAsNonRoot: true - Explicit non-root user (UID 1001+)
- readOnlyRootFilesystem - Read-only root FS where possible
- Dropped capabilities - ALL capabilities dropped
- No privilege escalation - allowPrivilegeEscalation: false
- Seccomp profiles - RuntimeDefault seccomp (roadmap)
Network Security
Pro TierNetworkPolicies for micro-segmentation. TLS everywhere via cert-manager. mTLS roadmap.
- Ingress TLS - Automated Let's Encrypt certificates
- NetworkPolicies - Default deny, explicit allow (Pro tier)
- Service mesh - mTLS via Linkerd/Istio (roadmap)
- Egress control - Restrict outbound traffic (Pro tier)
- Rate limiting - ingress-nginx annotations
Secrets Management
EnterpriseSealed Secrets for GitOps-friendly secret management. External Secrets Operator roadmap for Vault/AWS Secrets Manager.
- Sealed Secrets - Encrypted secrets in Git (PoC)
- External Secrets Operator - Vault/cloud integration (roadmap)
- No secrets in env vars - Volume mounts preferred
- Secret rotation - Manual rotation (automated roadmap)
- Audit logging - Secret access logs via K8s audit
Compliance Evidence
AutomatedPolicy reports, SBOMs, and deployment history for audit trail. No manual documentation.
- Policy reports - Kyverno audit logs per namespace
- SBOM artifacts - Stored per image in registry
- Git history - Deployment manifests traceable via Git
- Argo CD audit - Who deployed what, when
- Prometheus metrics - Policy violations over time
Compliance Mapping
StrixHQ controls map to common compliance frameworks.
NIST CSF
- ID.AM - Service catalog for asset inventory
- PR.AC - RBAC via Kubernetes, policy enforcement
- PR.DS - Encryption at rest/transit
- DE.CM - Observability for continuous monitoring
- RS.RP - GitOps rollback capabilities
CIS Kubernetes Benchmark
- 5.2.1 - runAsNonRoot enforced
- 5.2.2 - Privilege escalation prevention
- 5.2.3 - Capabilities dropped (ALL)
- 5.2.6 - hostNetwork denied
- 5.7.2 - NetworkPolicies (Pro tier)
SOC 2
- CC6.1 - Logical access controls (RBAC)
- CC6.6 - Vulnerability management (Trivy scanning)
- CC7.2 - Monitoring (observability baseline)
- CC8.1 - Change management (GitOps audit trail)
- A1.2 - Data availability (health probes, auto-healing)
GDPR (Data Protection)
- Art. 25 - Data protection by design (PII masking in logs)
- Art. 30 - Records of processing (audit logs)
- Art. 32 - Security measures (encryption, access control)
- Art. 33 - Breach notification (alerting baseline)
Security Roadmap
Baseline Security
Kyverno policies, Trivy scanning, non-root containers, TLS ingress
Enhanced Controls
NetworkPolicies, External Secrets Operator, advanced RBAC
Service Mesh & mTLS
Linkerd integration, mutual TLS between services, advanced observability
Runtime Protection
Falco for runtime anomaly detection, OPA Gatekeeper for advanced policies
Security questions?
Get in touch for a security review or penetration test scope.