SOC 2 Security Compliance for Hosts, VMs, Containers and Kubernetes

Implement an automated and scalable solution for hosts, VMs, containers and Kubernetes to address SOC 2 audit requirements

In a world of ephemeral IP addresses, changing applications, and dynamic environments in which containers move around clusters, traditional security approaches based on static IP addresses are unable to perform the observability and security functions necessary to meet audit requirement SOC 2 certification.

SOC 2 is based on five overarching Trust Services Criteria (TSC): security, availability, processing integrity, confidentiality, and privacy. Specifically, the security criteria are broken down into nine sections called common criteria (CC).

Organizations running Kubernetes specifically encounter challenges CC6 (logical and physical access), CC7 (systems operations), and CC8 (change management) when trying to comply with SOC 2 standards.

Download the whitepaper now to learn:

  • SOC 2 compliance challenges in a Kubernetes environment
  • How to comply with specific SOC 2 requirements using our step-by-step guide
  • How to automate and scale SOC 2 compliance for hybrid and multi-cloud environments in real time

Download Now

Copyright © Tigera, Inc.