The intent of this workshop is to provide an introduction to the Calico features that support SOC 2 compliance.
SOC 2 is based on five overarching Trust Services Criteria (TSC): security, availability, processing integrity, confidentiality, and privacy. Specifically, the security criteria are broken down into nine sections called common criteria (CC):
- CC1: Control Environment
- CC2: Communication and Information
- CC3: Risk Assessment
- CC4: Monitoring Activities
- CC5: Control Activities
- CC6: Logical and Physical Access Controls
- CC7: System Operations
- CC8: Change Management
- CC9: Risk Mitigation
Running Kubernetes clusters often presents challenges for CC6 (logical and physical access), CC7 (systems operations), and CC8 (change management) when trying to comply with SOC 2 standards.
Control# | Requirement(s) | Calico control(s) |
---|---|---|
CC 6.1, 6.6, 6.7, 6.8 | Implement logical access security measures to authorized systems only, implement controls to prevent or detect and act upon introduction of malicious software |
|
CC 7.1 | Monitor and detect configuration changes and capable of vulnerability management |
|
CC 7.2, 7.3, 7.4 | Monitor systems and components for anomalies and indicators of compromise |
|
CC 8.1 | Change Management: Authorize, Track, Approve changes to the system |
|
We will be focusing on securing a microservices based application and then providing audit and reporting of the controls that are put in place adhering to SOC2 controls. To accomplish this we will focus on these areas:
- Section 0. Getting Started
- Section 1. Deploy AKS
- Section 2. Connect AKS Cluster to Calico Cloud
- Section 3. Deploy Demo Microservices App
- Section 4. Apply Security Policies
- Section 5. Reports and Visibility
- Section 6. Enabling End to End Encryption with WireGuard
- Section 7. Audit Logs
- Section 8. Alerts
- Section 9. Cleanup