Helm Chart Security¶
Directory Inventory
See the Security Directory Inventory for a complete listing of files and resources in this directory.
Overview¶
This section outlines security considerations for deploying and using the Secure Kubernetes Container Scanning Helm charts. Security is a core design principle of our solution, with all charts implementing a least-privilege model, short-lived credentials, and other security best practices.
Security Architecture¶
Security-First Design¶
Our Helm charts implement a layered security architecture:
- Core Security Layer (scanner-infrastructure)
- Least-privilege RBAC implementation
- Short-lived access tokens
- Namespace isolation
-
Service account permissions
-
Operational Security Layer (common-scanner)
- Secure script execution
- Result data protection
-
Failure handling
-
Approach-Specific Security Controls
- Different security models for each scanning approach
- Approach-specific hardening options
Security Documentation¶
The security documentation is organized into the following sections:
- Best Practices: Recommended security practices for deploying and using the Helm charts
- RBAC Hardening: Detailed guidance for securing RBAC configurations
- Risk Assessment: Security risk assessment for each Helm chart component
Security Considerations by Scanning Approach¶
Kubernetes API Approach (standard-scanner)¶
This approach offers the strongest security posture:
- Minimal Attack Surface: Uses only Kubernetes API exec
- No Additional Containers: Maintains container isolation
- Clean Security Boundary: Clear separation between scanner and target
Debug Container Approach (distroless-scanner)¶
This approach has specific security considerations:
- Temporary Attack Surface Increase: Ephemeral debug container
- Process Namespace Consideration: Debug container can access target processes
- Limited Duration: Container exists only during scanning
Sidecar Container Approach (sidecar-scanner)¶
This approach has the highest security impact:
- Persistent Attack Surface Increase: Sidecar container remains with pod
- Process Namespace Sharing: Breaks container isolation boundary
- Resource Consumption: Additional container in every pod
Getting Started with Security¶
To implement a secure scanning solution:
- Review the Security Best Practices for deployment recommendations
- Follow the RBAC Hardening guide for proper access control
- Understand the Risk Assessment for each component
- Choose the appropriate scanning approach based on your security requirements
- Implement the recommended security controls for your environment