Cloud and containerization technologies offer high scalability, deployment orchestration, andportability. Because of this, they reduce the number of resources needed to manage applicationinfrastructure.

This introduces new security concerns. The majority of containerized applications have acomplex infrastructure, including many detached parts that communicate with each other over anetwork. That’s why even a small cyberattack can cause significant damage, influencingmultiple architecture layers.

Fortunately, there are innovative practices to secure your containerized infrastructure. AtIterasec, we offer a cloud security check service to independently review your cloud orcontainerization infrastructure.

Cloud security configuration

When talking about the misconfiguration problem, several factors are at play. That’s why ourteam provides complex security checks for your cloud system against the most commonsecurity issues and misconfigurations:

  • User management, authentication, authorization, access policies
  • Component isolation, security groups, VPN settings, Ingress/Egress Routing
  • Object storage visibility, such as S3
  • Security of serverless functions, such as Lambdas
  • Hardening of metadata WebServices (which can be abused by SSRF vulnerabilities)
  • Encryption of data-in-transit & data-at-rest
  • Key management & secret management (use of vaults)
  • Logging & monitoring
  • DFIR-Readiness (digital forensics & incident response)

This is crucial to ensure the environment’s configuration isn’t a source of risk and that it doesn’tdrift over time.


No matter what platform you use, it’s important to secure your cloud workloads. Our securitycheck expertise covers the platforms like:

AWS icon AWS
Azure icon Azure
Google Cloud Platform icon Google Cloud Platform

Container platform security

Every container has many components that can pose security risks and vulnerabilities.

What we check

  • Cluster setup:​ correctness of setup, testing access to kubectl, RBAC, Network policy,etc.
  • Security hygiene:​ updates, minimal OS, IAM roles, monitoring, and audit logging,verifying deployed binaries, etc.
  • Known attacks:​ disabling default tokens and dashboards, scanning images for knownvulnerabilities, etc.
  • Impact of microservice compromise:​ security policies, secret protection, sandboxing,authentication and encryption, etc.

The checklists we follow:

  • CIS Benchmarks
  • NIST Application Container Security Guide
  • OWASP Container Security Verification Standard

However, it’s important to remember that security isn’t just a check box, but improvements madeat multiple layers of the cloud infrastructure.

Contact us