Product P-06 / 08 / Downloadable + kit $100 USD × Terraform + YAML + PDF

Kubernetes production
hardening kit.

Cluster hardening checklist, Terraform module, network policies, and the audit tooling we deploy on day one of every Kubernetes engagement.

USD 100
One-time
47
Controls
1
Terraform module
0
“It depends” items

Four layers,
one day-one posture.

Each layer is enforced — no “consider enabling this” items. Apply, verify, move on.

A / Cluster

Cluster baseline

CIS Kubernetes Benchmark v1.8 — opinionated, defaulted.

  • CIS controls 47 enforced
  • Audit logging JSON + retained
  • kube-bench in CronJob
  • RBAC review PR-gated
  • Pod Security Std restricted
B / Network

Network policies

Default-deny + per-namespace allowlists.

  • Default deny egress enforced
  • Cilium CNI default
  • L7 policy examples included
  • DNS allowlist curated
  • TLS interception opt-in
C / Workload

Workload hygiene

Containers that obey the platform’s rules.

  • Non-root enforced
  • Read-only root default
  • Resource limits required
  • Liveness/readiness required
  • Distroless base preferred
D / Audit

Continuous audit

Posture drift is detected, not assumed.

  • Kyverno policies 23 included
  • Falco rules curated
  • Trivy scanning CI + cluster
  • Polaris dashboard optional
  • Weekly diff report automated

Apply, verify,
move on.

You get the Terraform module, the YAML bundles, the runbook, and a verification script that tells you what landed.

01

Terraform module

For EKS, GKE, or AKS. Cluster + node-group baseline with all CIS controls enabled by default.

02

Kustomize bundle

Network policies, Kyverno policies, Falco rules, distroless base templates — ready to apply.

03

Audit CronJobs

kube-bench, kube-hunter, Trivy scans run on a schedule and write results to your bucket of choice.

04

Verification script

Run after apply: tells you per-control whether it landed, with reproductions for any failures.

05

Migration runbook

12-page PDF for applying the kit to an existing cluster without breaking workloads.

Things buyers ask
on the first call.

If something isn’t answered here, ask in your intro email — we keep this list short on purpose.

Will this break our existing workloads?+

Likely some. Workload hygiene (non-root, resource limits, read-only root) catches violations on day one. The runbook walks the per-namespace rollout so you can stage breakage.

We don’t use Cilium. Does this still work?+

Yes — the policy schemas are CNI-agnostic. L7 features specific to Cilium are clearly flagged as optional in the bundle.

What about Istio / Linkerd?+

The kit doesn’t install a service mesh. If you have one, the network policies are designed to compose with it. We include notes on mesh-specific gotchas.

SOC 2 evidence?+

Yes — audit log retention, RBAC review cadence, vulnerability scanning, and continuous posture monitoring map directly to common SOC 2 controls. Evidence templates included.

Need it customized
for your team?

We do bespoke kits, too. Send a paragraph about the problem and we’ll come back inside 48 hours.

hello@kvb.dev Browse services