Skip to content

Security & Compliance

On-premises Kubernetes gives you physical control that cloud never can — but that control comes with responsibility. You own the hardware, the network perimeter, the key material, and every audit artifact. These four modules cover the security and compliance concerns unique to self-hosted infrastructure.


ModuleTopicsComplexity
Module 6.1: Physical Security & Air-Gapped EnvironmentsDatacenter controls, disconnected clusters, Harbor registry, image mirroring, sneakernet updates, air-gapped GitOpsAdvanced
Module 6.2: Hardware Security (HSM/TPM)HSMs for key management, TPM measured boot, Vault + PKCS#11, on-prem KMS replacement, LUKS + TPM disk encryptionAdvanced
Module 6.3: Enterprise Identity (AD/LDAP/OIDC)Active Directory integration, LDAP, Keycloak, Dex OIDC, RBAC group mapping, SSO for dashboardsMedium
Module 6.4: Compliance for Regulated IndustriesHIPAA physical controls, SOC 2, PCI DSS scope isolation, data sovereignty, K8s audit policy, evidence collectionAdvanced


  • Security engineers responsible for hardening on-premises Kubernetes clusters
  • Compliance officers mapping regulatory frameworks to Kubernetes infrastructure
  • Platform teams integrating enterprise identity systems with Kubernetes RBAC
  • Infrastructure architects designing air-gapped or classified environments