Sold by: Karthik Consulting, LLCÂ
Karthik Consulting provides a container security posture assessment service based on two DoD standards: the DISA Kubernetes Security Technical Implementation Guide (STIG) and the DISA Control Correlation Identifiers (CCIs). Karthik Consulting leverages Kyverno, an open-source policy engine designed for Kubernetes, to scan, gather, and deliver container security insights. Backed by years of cybersecurity experience, Karthik Consulting assesses your current container security posture and provides recommendations to optimize and secure it, focusing on DevSecOps best practices. For enterprises leveraging containerization, this assessment offers visibility and security for containerized solutions without the overhead of implementing and maintaining expensive tools.
Overview
Our Approach / Overview
Karthik Consulting provides a tailored solution for DoD systems, addressing specific requirements that go beyond general container security best practices. Our Kyverno-based policy compliance solution can be seamlessly integrated into your DevSecOps implementations.
Key Features
- Kyverno-Based Policy Compliance: Ensures compliance with security policies using an open-source policy engine designed for Kubernetes.
- Integration with DevSecOps: Supports and enhances your DevSecOps practices.
- Accelerated Implementation: Reduces time to market for policy-based assessments.
Value Proposition Assessing containers against the DISA Kubernetes STIG offers a comprehensive approach to enhancing security and ensuring compliance. This assessment helps organizations:
- Identify and address potential vulnerabilities, misconfigurations, and security gaps in their containerized environments.
- Implement best practices in container security, reducing the risk of breaches and unauthorized access.
- Improve their overall security posture, even in non-military contexts, by adhering to DoD-level security standards.
- Meet regulatory requirements, crucial for organizations working with government agencies or in highly regulated industries.
- Establish a structured framework for continuous security improvement and standardize security practices across projects and environments.
- Enhance operational efficiency by identifying and correcting misconfigurations that could cause stability issues.
- Foster a security-conscious culture within development and operations teams, leading to more robust and reliable containerized applications.
Key Activities
- Contractual Agreement and NDA: Establishing the engagement.
- Information Gathering: - Details about the container image (name, tag, build specifications), runtime configuration (resource limits, environment variables), and Kubernetes deployment specifics (pod specs, service accounts). - Information on network policies, storage configurations, security contexts, and secrets management. - Access to the running container, cluster-level information, and supporting documentation. - Appropriate permissions to view and assess these resources. - Logging and monitoring configurations, as well as any relevant security policies and procedures.
Assessment:
- Our team will scan, gather, and document the current state.
- Provide a comprehensive report, including compliance status for each rule and overall compliance.
Remediation (Optional):
- After implementing changes, our team can re-assess to confirm successful remediation efforts.
- Expert engineers can also provide managed services to help with remediation.
Deliverables
- Comprehensive Security Assessment Report: Based on the DISA container hardening guide.
- Compliance Report: Evaluated against the 29 Control Correlation Identifiers (CCIs) that guide container security.
- Recommendations for Remediation: Detailed guidance on addressing identified issues.
Highlights
- Save on Kyverno-based policy compliance implementation and maintenance
- Gain visibility into container security based on DISA Kubernetes STIG (Release: 11 Benchmark Date: 25 Oct 2023) and remediation recommendations
- Gain visibility into container security based on DISA Control Correlation Identifier initiative (CCIs) and remediation recommendations
Details
Unlock automation with AI agent solutions
Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.

Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Resources
Vendor resources
Support
Vendor support
For further questions regarding Karthik Consulting AWS Marketplace offerings and pricing, please contact us at awsmarketplaceseller@karthikconsulting.comÂ
Software associated with this service

Nirmata Control Hub
By Nirmata
Eliminate misconfigurations and enforce Kubernetes best practices using policy-as-code. Get policy insights, alerts, reports, and team collaboration through integration with DevSecOps processes, tools, and workflows.
Nirmata Enterprise for Kyverno
By Nirmata
Kyverno is a policy engine natively designed for Kubernetes to secure and automate Kubernetes configurations. Nirmata Enterprise for Kyverno helps you accelerate time to value and achieve peace of mind. Get enterprise support, adapters, services, and training!