Skip to content

CISO and DPO Guide Overview

This part of our open source documentation is intended for CISOs, DPOs or similar. Our goal is to help users of Elastisys Compliant Kubernetes prove to both internal or external auditors that the application runs on top of a secure and compliant platform.

The vision of the project is to secure Europe’s digital future for services critical to society. One very important aspect in order for us to deliver on that vision is to provide best in class documentation for how we enable users to fulfill their security and compliance requirements, control by control.

From the start, Elastisys Compliant Kubernetes has been built based on relevant EU regulations and industri best practices. We've drawn inspiration from, and based architectural decision on information gathered from GDPR, NIS, NIS2, NIST, ENISA, MSB (Swedish Civil Contingencies Agency), BSI (German Federal Office for Information Security), US Department of Defense, industry specific regulations and much more.

Platform architecture influenced by information security best practices

Platform components of Elastisys Compliant Kubernetes and their information security best practices influences

Additional resources

Resources for the Chief Information Security Officer (CISO) or similar:

Resources for the Data Protection Officers (DPO) or similar:

You might also want to read the Frequently Asked Questions (FAQ).