Kubernetes Compliance Automation: CIS, SOC 2, HIPAA, and PCI DSS with kubeqa
How to automate Kubernetes compliance scanning for CIS Benchmarks, SOC 2, HIPAA, PCI DSS, and GCC frameworks (NESA, NCA) using kubeqa - with continuous monitoring and drift detection.
Kubernetes compliance is a manual, painful process for most teams. Security engineers run kube-bench every few weeks, export the results to a spreadsheet, map findings to SOC 2 controls by hand, and produce a PDF report for auditors. By the time the report is finished, the cluster has drifted.
kubeqa automates the entire workflow - scan, map, monitor, and report - in a single command.
The Compliance Challenge in Kubernetes
Kubernetes clusters are dynamic. Pods scale, configurations change, Helm charts get upgraded, and engineers kubectl apply ad hoc changes. Traditional compliance approaches fail because:
- Point-in-time scans are stale within hours - clusters change constantly
- Framework mapping is manual - kube-bench gives you CIS results, but SOC 2 auditors want SOC 2 controls
- Multi-framework coverage requires multiple tools - CIS (kube-bench), PCI (Checkov), SOC 2 (manual), HIPAA (manual)
- Drift detection is non-existent - you don’t know when a previously passing control starts failing
Supported Compliance Frameworks
kubeqa ships with built-in profiles for:
| Framework | Controls | Use Case |
|---|---|---|
| CIS Kubernetes Benchmark 1.8 | 142 | General K8s security baseline |
| CIS EKS Benchmark 1.4 | 98 | AWS EKS-specific |
| CIS AKS Benchmark 1.2 | 87 | Azure AKS-specific |
| CIS GKE Benchmark 1.5 | 91 | Google GKE-specific |
| NSA/CISA Kubernetes Hardening | 64 | US government security |
| Pod Security Standards | 28 | K8s-native security baseline |
| SOC 2 Type II | 56 | SaaS companies, auditors |
| HIPAA Technical Safeguards | 48 | Healthcare workloads |
| PCI DSS v4.0 | 71 | Payment processing |
| NESA (UAE) | 38 | UAE critical infrastructure |
| NCA ECC (Saudi) | 42 | Saudi regulated industries |
Quick Start: Your First Compliance Scan
# Install kubeqa
brew install nomadx-ae/tap/kubeqa
# Run a CIS benchmark scan
kubeqa compliance audit --framework cis-1.8
# Output:
# CIS Kubernetes Benchmark v1.8
# =============================
# Pass: 128/142 (90.1%)
# Fail: 14 controls
# Manual: 0
#
# Critical Findings:
# 1.2.1 Ensure API server audit logging is enabled
# 4.2.1 Minimize access to secrets
# 5.1.6 Ensure Network Policies are defined
Multi-Framework Scanning
Run multiple frameworks in a single command. kubeqa maps findings across frameworks automatically:
kubeqa compliance audit --framework cis-1.8,soc2,pci-dss
# Cross-Framework Mapping:
# Finding: "No network policy in namespace payments"
# → CIS 5.3.2 (FAIL)
# → SOC 2 CC6.1 (FAIL) - Logical access boundary controls
# → PCI DSS 1.3.2 (FAIL) - Restrict inbound/outbound traffic
One finding, three frameworks, one fix. This is the power of unified compliance scanning.
Continuous Compliance Monitoring
Point-in-time scans are useful but insufficient. kubeqa supports continuous monitoring with drift detection:
# Deploy kubeqa as a CronJob for daily scans
helm install kubeqa kubeqa/kubeqa \
--set schedule="0 6 * * *" \
--set compliance.frameworks="{cis-1.8,soc2}" \
--set notifications.slack.webhook="$SLACK_WEBHOOK"
When a previously passing control starts failing, kubeqa sends an alert:
🔴 Compliance Drift Detected
Cluster: production (EKS us-east-1)
Framework: CIS 1.8
Control: 5.1.6 - Ensure Network Policies are defined
Status: PASS → FAIL
Changed: 2026-03-14 09:15 UTC
Namespace: payments
Evidence Collection for Auditors
Generate auditor-ready reports with a single command:
kubeqa compliance report \
--framework soc2 \
--output pdf \
--evidence \
--open
The report includes:
- Control-by-control pass/fail status
- Evidence screenshots (resource configurations)
- Remediation instructions for failing controls
- Historical trend showing compliance improvement over time
GCC Compliance: NESA and NCA
For organizations operating in the UAE and Saudi Arabia, kubeqa includes dedicated compliance profiles:
# UAE NESA compliance
kubeqa compliance audit --framework nesa
# Saudi NCA ECC compliance
kubeqa compliance audit --framework nca-ecc
These frameworks cover data sovereignty, encryption requirements, access controls, and audit logging specific to GCC regulatory requirements. No other open-source K8s tool offers this coverage.
Remediation with AI
kubeqa doesn’t just find problems - it generates fixes:
kubeqa compliance audit --framework cis-1.8 --fix
# Finding: 5.1.6 - No NetworkPolicy in namespace "payments"
#
# Remediation:
# kubectl apply -f - <<EOF
# apiVersion: networking.k8s.io/v1
# kind: NetworkPolicy
# metadata:
# name: default-deny-all
# namespace: payments
# spec:
# podSelector: {}
# policyTypes:
# - Ingress
# - Egress
# EOF
The AI backend detects whether you use Helm, Kustomize, or raw YAML and generates the fix in the right format.
Get Started
brew install nomadx-ae/tap/kubeqa
kubeqa compliance audit --framework cis-1.8
View on GitHub | Full compliance documentation
For hands-on compliance remediation and NESA/NCA consulting, contact kubernetes.ae.
Ship Kubernetes with Confidence
Free for open-source use. No credit card required. Install kubeqa and run your first cluster scan in under 5 minutes.
Get Started Free