Deployment Overview¶
Directory Inventory
See the Deployment Directory Inventory for a complete listing of files and resources in this directory.
This document provides an overview of deploying the Secure CINC Auditor Kubernetes Container Scanning solution in various environments.
Deployment Methods¶
The container scanning solution can be deployed in several ways:
- Script-based Deployment: Using helper scripts for direct deployment
- Helm Charts Deployment: Using modular Helm charts for production deployment
- CI/CD Pipeline Integration: Integrating scanning into existing CI/CD workflows
Each deployment method has its own advantages and is suitable for different scenarios.
Deployment Scenarios¶
We provide guidance for several common deployment scenarios:
- Enterprise Production Environment: Secure, scalable deployment for enterprise environments
- Development Environment: Rapid deployment for development and testing
- CI/CD Pipeline Environment: Integration with automated pipelines
- Multi-Tenant Kubernetes Environment: Secure deployment in shared clusters
Advanced Deployment Topics¶
For specialized environments and requirements:
- Scaling Considerations: Handling large-scale deployments
- Security Considerations: Enhanced security measures
- Monitoring and Maintenance: Long-term operations
- Air-Gapped Environments: Deployment without internet access
- High-Security Environments: Additional security controls
Deployment Prerequisites¶
Before deploying, ensure you have:
- Kubernetes Cluster Requirements:
- Kubernetes 1.16+ (for all features including ephemeral containers)
- RBAC enabled
-
Service account support
-
Tool Requirements:
- kubectl with cluster access
- Helm 3+ (for Helm-based deployment)
- CINC Auditor/InSpec
-
SAF CLI (for threshold validation)
-
Access Requirements:
- Permissions to create namespaces, service accounts, and roles
- Permissions to create and manage pods
Getting Started¶
To get started with deployment, follow these steps:
- Review the deployment prerequisites
- Choose the appropriate deployment method for your environment
- Follow the detailed instructions for your chosen method
- Verify your deployment using the verification procedures