Security & Compliance
All security and compliance-related topics listed in this document pertain to Kubeshark Enterprise Edition.
Terms Used in This Document
- Vendor - KubeHQ (developer of Kubeshark) and its employees.
- Customer - The company and the employees that use Kubeshark on the company’s premises.
- Viewer - An employee of the Customer using Kubeshark to inspect traffic.
- Admin - An employee of the Customer responsible for deploying, running, and maintaining Kubeshark within the Customer’s premises.
- Data - Data appearing in traffic that is processed by Kubeshark.
- Sensitive Data - Data that can be perceived as sensitive and appear from time to time as part of Data.
No Data Leaves the Premises
Kubeshark is self-hosted and operates 100% on-premises. Designed to run in air-gapped environments, it does not require any internet connection, and absolutely no Data leaves the premises. As such, the Vendor is not exposed to the Data in any way.
No Access to Vendor
By design, the Vendor’s employees have no access to the product or the data it generates once deployed in the customer’s environment.
Local Container Registry
All containers comprising Kubeshark are stored in a local container repository and can be scanned for vulnerabilities based on the organization’s security policies. The containers can be downloaded or built locally if necessary.
Code Transparency
Customers requesting access to Kubeshark’s codebase are added to the Kubeshark GitHub organization and gain complete access to the entire codebase, including the above-mentioned containers.
Sensitive Data Redaction
Sensitive Data can be redacted at the source, making it unavailable to Viewers.
Traffic Segmentation
Kubeshark can be configured to process Data from specific namespaces and pods using pod targeting rules. Only traffic from allowed namespaces and pods is processed. Kubeshark ignores traffic not matching the pod targeting rules.
Learn more about Pod Targeting here.
Viewer / Data Authorization
Viewer access can be restricted using specific authorization rules, enabling users to view only the Data they are permitted to see. For instance, developers can have access to certain namespaces, while DevOps may access different ones.
Authentication
To prevent unauthorized access, Kubeshark employs SAML to authenticate users using their corporate identities.
Learn about SAML capabilities here.
Dashboard Encryption
The dashboard can be made available using Ingress with TLS encryption if necessary.
SOC 2 Type II Certified
Kubeshark has successfully completed a SOC 2 Type II audit, demonstrating our commitment to maintaining the highest standards of security for our customers.
About Our SOC 2 Type II Report
- Report Type: SOC 2 Type II
- Trust Services Criteria: Security
- Audit Period: August 1, 2025 to October 31, 2025
- Auditor: Decrypt Compliance PC (AICPA member)
- Opinion: Unqualified - Controls were suitably designed and operated effectively
A SOC 2 Type II report provides assurance that our security controls have been independently tested and verified to be operating effectively over an extended period, not just at a single point in time.
Requesting the SOC 2 Report
Customers and prospective customers can request a copy of our SOC 2 Type II report by contacting us at security@kubeshark.com. The report is provided under NDA.
Ongoing Compliance
We are committed to maintaining our SOC 2 compliance on an annual basis. Our security program includes continuous monitoring, regular risk assessments, and annual penetration testing to ensure ongoing protection of customer data.
ISO 27001
Kubeshark is in the process of attaining ISO 27001 certification.