hb.dev

Kubernetes security evaluation for ISO 27001 certification

15 October 2025Payment processing clientFintech / Critical infrastructure

Migrating from on-premise servers to the cloud changes the security model entirely. When the workload is payment processing and the target is ISO 27001 certification, every assumption about how the platform is configured needs to be verified, not inherited.

The challenge

Our client processes payments for a large number of downstream businesses. They were migrating their entire service estate from on-premise servers to Azure Kubernetes Service (AKS) and needed to achieve ISO 27001 certification for the new platform.

ISO 27001 requires demonstrable controls across information security management: access control, cryptography, operations security, communications security, and more. Mapping these controls onto a Kubernetes environment is not straightforward. The platform had been built under delivery pressure, and the team needed an independent evaluation of where they stood before going into the certification process.

The stakes were high:

  • Payment processing is critical infrastructure with strict regulatory requirements
  • A failed certification would delay the migration and impact client confidence
  • Security gaps in a payment platform carry financial and legal consequences beyond the certification itself
  • The team needed a clear, prioritised view of what to fix and in what order

Our approach

We conducted a systematic security evaluation of the AKS platform, mapping ISO 27001 Annex A controls to the Kubernetes environment and assessing compliance across every relevant area.

PlatformAzure Kubernetes Service (AKS)
StandardISO 27001:2022
SectorPayment processing
MigrationOn-premise to Azure

Network segmentation

We assessed network policies, ingress controls, and namespace isolation. In most Kubernetes environments, the default configuration allows unrestricted pod-to-pod communication. For a payment processing platform, this means a compromise in one service could give an attacker lateral access to sensitive financial data across the cluster. We evaluated whether default-deny policies were in place, whether ingress was properly restricted, and whether network-level controls met ISO 27001 requirements for communications security.

Secrets management

ISO 27001 requires controls around cryptography and key management. We reviewed how secrets were created, stored, rotated, and accessed across the platform. This included evaluating whether secrets were encrypted at rest, whether rotation schedules existed, whether access was scoped through RBAC, and whether external secret management was in use for sensitive credentials.

Change management

The standard requires documented change management processes with audit trails. We assessed the GitOps configuration, environment promotion workflows, and whether changes to production could be traced back to approved pull requests. This included reviewing how configuration differed between environments and whether the structure supported clear, reviewable promotions.

Pod security

We evaluated container security posture: whether containers ran as root, whether resource limits were enforced, whether image provenance was verified, and whether policy enforcement prevented deployment of non-compliant workloads. ISO 27001 requires controls on system acquisition and development, and in a Kubernetes context this maps directly to how pods are configured and what is allowed to run.

Observability and audit

ISO 27001 requires event logging, monitoring, and the ability to detect and respond to security incidents. We assessed the logging stack, alerting configuration, log retention policies, and whether runtime security monitoring was in place. For a payment platform, the ability to reconstruct what happened during an incident is not optional.

Results

The evaluation delivered a comprehensive compliance gap analysis mapped directly to ISO 27001 Annex A controls.

5

Key areas assessed

mapped to Annex A controls

ISO 27001

Standard

2022 revision

AKS

Platform evaluated

full cluster review

Prioritised

Remediation roadmap

risk-ranked findings

Each finding was mapped to the relevant ISO 27001 control, rated by risk severity, and accompanied by specific remediation guidance. The client received a prioritised roadmap: what to fix first to close the highest-risk gaps, and what could be addressed incrementally. The evaluation gave the team a clear, evidence-based picture of their compliance posture and a concrete path toward certification.

Client feedback

They found gaps our internal team had missed for months. The prioritised roadmap meant we could start remediating the same week.

We went into the certification process knowing exactly where we stood. No surprises.

Working on a similar challenge?

We build AI systems for defence and critical infrastructure clients across Northern Europe. Let's talk about what's possible for your environment.

Let's talk