FedRAMP Kubernetes: Running Containers for Federal Workloads
Federal agencies want Kubernetes but FedRAMP adds complexity. Here's how to architect Kubernetes for FedRAMP Moderate and High baselines.
THNKBIG Team
Engineering Insights
FedRAMP authorization is hard. Adding Kubernetes to the boundary adds real complexity — but federal agencies increasingly depend on container platforms for modern applications. This guide breaks down exactly how to get Kubernetes through FedRAMP.
What Is FedRAMP?
FedRAMP (Federal Risk and Authorization Management Program) is the U.S. government's standardized security framework for cloud services. It uses the NIST SP 800-53 control catalog and comes in three impact levels: Low (~125 controls), Moderate (~325 controls), and High (~421 controls). For most government contractors, FedRAMP Moderate is the target baseline.
FedRAMP and Kubernetes: Control Family Mapping
Kubernetes touches multiple FedRAMP control families directly. Understanding these mappings is the foundation of your compliance architecture.
- AC (Access Control) → Kubernetes RBAC, service account permissions, namespace isolation
- AU (Audit and Accountability) → API server audit logging, SIEM integration
- CM (Configuration Management) → Node hardening, CIS Kubernetes Benchmark, STIGs
- SC (System and Communications Protection) → Encryption in transit and at rest, network segmentation
- SI (System and Information Integrity) → Container image scanning, vulnerability management pipelines
The good news: managed Kubernetes on FedRAMP-authorized clouds (AWS GovCloud, Azure Government) inherits many controls. The challenge: you're still responsible for how you configure and use Kubernetes within that boundary.
FIPS 140-2 Encryption Requirements
FedRAMP Moderate and High require FIPS 140-2 validated cryptography. Standard Kubernetes components don't use FIPS-validated modules out of the box. You need three things:
- FIPS-enabled node images — RHEL in FIPS mode or Ubuntu FIPS kernel
- FIPS-validated TLS in your service mesh (Istio with BoringCrypto builds)
- Applications built using FIPS-validated cryptographic libraries
OpenShift is the most common choice for federal Kubernetes because Red Hat ships FIPS-validated builds. EKS and AKS can run FIPS workloads but require significantly more configuration to reach the same posture.
STIG Hardening for Kubernetes
DISA publishes Security Technical Implementation Guides (STIGs) for Kubernetes. The Kubernetes STIG covers API server configuration, etcd security, network policies, and pod security. Implement these as your baseline hardening before any FedRAMP assessment begins.
- Disable anonymous authentication on the API server
- Enable audit logging with defined retention periods (minimum 1 year, often 3+)
- Encrypt Kubernetes Secrets at rest via etcd envelope encryption
- Restrict privileged container execution cluster-wide using Pod Security Standards
- Implement NetworkPolicies for pod-to-pod traffic segmentation in every namespace
Tools like kube-bench and OpenShift's compliance-operator automate STIG assessment and generate audit-ready reports, substantially reducing assessment preparation time.
Authorization Boundary Controls
FedRAMP requires a clearly defined authorization boundary. Every component inside must be documented, controlled, and audited. For Kubernetes, define your boundary scope upfront: just the cluster, the applications, the CI/CD pipeline, or all three. Each component added to the boundary increases documentation burden but also broadens what you can claim as authorized infrastructure.
Network boundary enforcement: private subnets for all worker nodes (no direct internet), VPC endpoints for GovCloud services, NetworkPolicies for east-west pod traffic, all internet egress through an inspecting and logging proxy, and all external ingress through WAF-protected load balancers only.
Continuous Monitoring: The FedRAMP Requirement
FedRAMP mandates ongoing monitoring — not a point-in-time assessment. Your monitoring stack must cover: vulnerability scanning in CI/CD (Trivy, Grype) and at runtime (Sysdig, Prisma Cloud), continuous configuration compliance checks against CIS Kubernetes Benchmark, and security event ingestion to your SIEM with defined remediation timeframes per severity.
Every API call, authentication event, and authorization decision must flow to Kubernetes audit logs. This audit trail supports incident response investigations and satisfies the FedRAMP Audit and Accountability (AU) control family requirements completely.
Software Supply Chain Security
FedRAMP increasingly scrutinizes software supply chain risk under Executive Order 14028. For Kubernetes: all container images must come from trusted internal registries, image signing with Sigstore (Cosign) provides cryptographic provenance verification, SBOMs (Software Bill of Materials) document every component in every container, and admission controllers like OPA Gatekeeper or Kyverno enforce these policies automatically at deploy time.
Building Your FedRAMP-Ready Kubernetes Architecture
A complete FedRAMP ATO requires a System Security Plan (SSP) documenting every control implementation. For Kubernetes, that means capturing: node hardening baseline, API server audit log configuration, secrets management approach, and inter-service encryption requirements. Each must reference specific Kubernetes configurations, not just general policies.
THNKBIG's cybersecurity and compliance team has guided government contractors through FedRAMP Authorization To Operate (ATO) processes for Kubernetes-based systems on AWS GovCloud and Azure Government. We accelerate the process with pre-built SSP templates, automated compliance scanning, and architecture patterns proven against the most common FedRAMP audit findings. Contact us to start your FedRAMP Kubernetes journey.
FedRAMP-Ready Kubernetes for Federal Workloads
FedRAMP authorization is challenging, and adding Kubernetes into the authorization boundary increases complexity. But for federal agencies and contractors building modern, cloud-native applications, container platforms are becoming essential. The path to success is understanding how FedRAMP controls map to Kubernetes and designing your architecture, configuration, and processes accordingly.
FedRAMP and Kubernetes
FedRAMP is based on NIST SP 800-53 and defines security controls that cloud services must implement.
- FedRAMP Moderate: ~325 controls
- FedRAMP High: ~421 controls
Kubernetes directly affects many of the most operationally significant control families:
- Access Control (AC) – Kubernetes RBAC, service accounts, namespace isolation
- Audit and Accountability (AU) – API server audit logging, log forwarding, retention
- Configuration Management (CM) – node hardening, image scanning, GitOps, baseline configs
- System and Communications Protection (SC) – encryption in transit/at rest, network segmentation, service mesh
- System and Information Integrity (SI) – runtime security, anomaly detection, supply chain protections
Using managed Kubernetes on FedRAMP-authorized cloud environments (e.g., AWS GovCloud, Azure Government) lets you inherit a significant portion of the underlying infrastructure controls (physical, environmental, some network and platform controls). However, you are still responsible for:
- How the cluster is configured
- How workloads are deployed and secured
- How identities, secrets, and network paths are managed
- How logging, monitoring, and incident response are implemented
FIPS 140-2 Encryption in Kubernetes Environments
FedRAMP Moderate and High require FIPS 140-2 validated cryptography for protecting sensitive data. Vanilla Kubernetes components and common container images are not automatically FIPS-compliant.
To align with FedRAMP requirements:
- Use FIPS-enabled node images
- RHEL in FIPS mode
- Ubuntu Pro FIPS images
- Ensure the OS crypto libraries are FIPS-validated and FIPS mode is enforced
- Ensure FIPS-validated TLS for service-to-service traffic
- Use a service mesh (e.g., Istio-based meshes, OpenShift Service Mesh) configured to use FIPS-validated crypto modules
- Terminate TLS at components that rely on FIPS-validated libraries
- Build applications with FIPS-validated crypto libraries
- Use language runtimes and libraries that support FIPS mode (e.g., OpenSSL FIPS modules where applicable)
- Avoid custom or non-validated cryptographic implementations
OpenShift is often preferred in federal environments because Red Hat provides FIPS-validated builds and documentation that directly supports FedRAMP and DoD requirements. Managed Kubernetes offerings like EKS and AKS in Gov regions can run FIPS-compliant workloads, but typically require more manual configuration and validation.
STIG Hardening for Kubernetes
The Defense Information Systems Agency (DISA) publishes Security Technical Implementation Guides (STIGs), including a Kubernetes STIG that is increasingly referenced in federal and DoD environments.
The Kubernetes STIG covers:
- API server configuration
- etcd protection and encryption
- Network policies and segmentation
- Pod security and privilege restrictions
Key hardening measures to implement as a baseline:
- Disable anonymous authentication on the API server
- Enable and tune audit logging with sufficient verbosity to capture security-relevant events
- Encrypt Kubernetes Secrets at rest (e.g., KMS-backed encryption for etcd)
- Restrict privileged containers using Pod Security Admission or equivalent policies
- Enforce network policies for pod-to-pod and namespace-to-namespace segmentation
Automation is critical:
- Use tools like kube-bench, OpenShift Compliance Operator, or similar to continuously assess STIG and CIS Benchmark compliance.
- Integrate these checks into CI/CD so that non-compliant configurations are caught before deployment.
Defining the FedRAMP Authorization Boundary
FedRAMP requires a clearly defined authorization boundary. Every component inside that boundary must be documented, controlled, and monitored.
For a Kubernetes-based system, the boundary typically includes:
- Kubernetes control plane (managed or self-managed)
- Worker nodes and node OS configurations
- Applications and microservices running on the cluster
- CI/CD pipeline components (build servers, runners, pipelines)
- Supporting services, such as:
- Container/artifact registries
- Secrets management (e.g., AWS Secrets Manager, Azure Key Vault)
- Logging and monitoring stacks
- Service mesh and API gateways
Network Boundary Controls
To meet FedRAMP and common agency expectations:
- Place all worker nodes in private subnets
- Use VPC endpoints (AWS) or private endpoints (Azure) for cloud services to avoid public internet paths
- Apply network policies for east-west pod traffic segmentation
- Route all internet egress through a controlled proxy with logging and content controls
- Restrict ingress to WAF-protected load balancers or API gateways, with TLS termination using FIPS-validated crypto
Continuous Monitoring Requirements
FedRAMP emphasizes continuous monitoring, not one-time compliance. Your Kubernetes security operations must provide ongoing visibility and timely remediation.
Core components of a FedRAMP-aligned monitoring stack:
- Vulnerability scanning
- Scan container images in CI/CD (e.g., Trivy, Grype)
- Perform runtime scanning and drift detection (e.g., Sysdig, Falco-based tools)
- Configuration compliance
- Automated STIG and CIS checks on clusters and nodes
- Policy-as-code to prevent non-compliant configurations from being deployed
- Security event monitoring
- Ship Kubernetes API server audit logs, node logs, and application logs to a central SIEM
- Correlate events across identity providers, Kubernetes, and cloud-native services
- Remediation tracking
- Define SLAs for remediation (e.g., critical within 30 days, high within 60 days, etc.)
- Track findings from scanners, audits, and penetration tests through closure
Every API call, authentication event, and authorization decision should be logged and retained per FedRAMP requirements. These logs support incident response, forensics, and periodic FedRAMP audits.
Supply Chain Security for Containers
FedRAMP increasingly focuses on software supply chain security, especially for containerized workloads.
Key practices include:
- Trusted registries only
- Pull images exclusively from approved, scanned registries
- Mirror and vet upstream images into a controlled internal registry
Explore Our Solutions
Related Reading
The Software Supply Chain: Its Importance for Midmarket Cloud Native Businesses
Protect your software supply chain with SBOMs, signed artifacts, and secure CI/CD practices. Essential guidance for midmarket enterprises.
HIPAA Compliance on Kubernetes: A Technical Guide
Running healthcare workloads on Kubernetes requires specific controls. Here's how to meet HIPAA requirements with proper encryption, access controls, and audit logging.
Cloud Drops Episode #004 - Security Security Security
This week's cloud native news focuses on security: vulnerability disclosures, new security tools, and best practices for protecting your clusters.
THNKBIG Team
Engineering Insights
Expert infrastructure engineers at THNKBIG, specializing in Kubernetes, cloud platforms, and AI/ML operations.
Ready to make AI operational?
Whether you're planning GPU infrastructure, stabilizing Kubernetes, or moving AI workloads into production — we'll assess where you are and what it takes to get there.
US-based team · All US citizens · Continental United States only