Skip to content
Elastisys Compliant Kubernetes
The Journey for Application Developers
Initializing search
Try out Managed
Compliant Kubernetes
Elastisys Compliant Kubernetes
Try out Managed
Compliant Kubernetes
Overview
For Application Developers
For Application Developers
Getting Started
Getting Started
Step 1: Prepare
Step 2: Deploy
Step 3: Operate
Go Deeper
Go Deeper
Prepare Your Application
Prepare Your Identity Provider (IdP)
Container registry
Continous Development
Network Model
Kubernetes API
Kubernetes UI (Lens)
Namespaces
Logs
Log-based Alerts
Long-term Log Retention
Metrics
Metric Alerts
Maintenance
Backups
CI/CD
Demarcation
How to Delegate
How many environments?
Cluster API
Safeguards
Safeguards
Overview
Enforce No Root
Enforce Restricted Privileges
Enforce NetworkPolicies
Enforce Resources
Enforce Trusted Registries
Enforce No Latest Tag
Enforce Job TTL
Additional Services
Additional Services
Overview
PostgreSQL
TimescaleDB
Redis
RabbitMQ
Jaeger (preview)
Argo CD (preview)
Self-Managed Services
Self-Managed Services
FerretDB (self-managed)
Keycloak (self-managed)
JupyterHub (self-managed)
SealedSecrets (self-managed)
MongoDB (self-managed)
Sjunet (self-managed)
Flux (self-managed)
Kafka (self-managed)
Go-live Checklist
Troubleshooting
FAQ
For Platform Administrators
For Platform Administrators
Overview
Getting Started
Provider Audit
Standard Template for on-prem Environment
QA
Advanced Configuration
Advanced Configuration
Overview
Sizing
Ingress
Access Control
OpenSearch Mappings
User Alerts
User Managed CRDs (preview)
Disaster Recovery
Breaking the Glass
Use of Cryptography
Use of Credentials
Capacity Management
Clock Synchronization
Maintenance
Clean Up
Troubleshooting
FAQ
Additional Services
For CISOs and DPOs
For CISOs and DPOs
Overview
GDPR (EU)
ISO 27001 (EU)
Healthcare
Healthcare
HSLF-FS 2016:40 (SE)
HIPAA (US)
MDR (EU)
Public sector
Public sector
MSBFS 2020:7 (SE)
NIS2
NIS2
Overview
KRITIS (DE)
BSI IT-Grundschutz (DE)
MSBFS 2018:8 (SE)
CISO Dashboards
CISO Dashboards
Audit Logs
Backup Dashboard
Cryptography Dashboard
Intrusion Detection Dashboard
Policy-as-Code Dashboard
Network Security Dashboard
Capacity Management (Kubernetes Status) Dashboard
Vulnerability Dashboard
Log Review
FAQ
How do I comply with GDPR Art. 17 Right to erasure ("right to be forgotten")?
For Contributors
For Contributors
Overview
Architecture
Architectural Decision Log
Tech Radar
Release Notes
Release Notes
Compliant Kubernetes
CK8S Kubespray
CK8S PostgreSQL
CK8S RabbitMQ
CK8S Redis
CK8S Jaeger
CK8S Argo CD
Glossary
Roadmap
Fully Managed Compliant Kubernetes
Support for Self-Managed Compliant Kubernetes
Consulting
Official Training
Blog
Privacy Policy
The Journey for Application Developers
¶
Head over to
Step 1: Prepare
to get started on your journey!
Back to top