Security & Compliance

Security posture and compliance scanning for BlumeOps infrastructure.

Compliance frameworks

FrameworkToolClusterNotes
CIS Kubernetes Benchmark v1.11prowlerminikube-indriWeekly CronJob, ~82 checks
PCI DSS v4.0 (K8s mapping)prowlerminikube-indriReuses CIS checks mapped to PCI requirements
ISO 27001:2022 (K8s mapping)prowlerminikube-indriPartial — 22 of 92 controls mapped

Scanning tools

Identity & access

  • authentik — SSO/OIDC provider for all web services
  • RBAC — Kubernetes role-based access control (audited by Prowler RBAC checks)

Network & TLS

  • caddy — TLS termination for *.ops.eblu.me services
  • flyio-proxy — public ingress via Fly.io tunnel
  • Tailscale — zero-trust mesh networking across all nodes

Secrets management

Reports

All compliance scan reports are stored on sifaka:/volume1/reports/. See read-compliance-reports for access and interpretation.

Known gaps

  • No SOC 2 compliance mapping for Kubernetes (Prowler only maps SOC 2 for AWS/Azure/GCP)
  • k3s control plane checks produce no results (embedded binary, no static pods) — consider kube-bench
  • Container image scanning covers blumeops/* images only — upstream images (ollama, immich, etc.) are not scanned
  • IaC scanning covers the blumeops repo only — no scanning of third-party Helm charts or vendored manifests