Salus Logo
Infrastructure Testing

Containerisation Security

Containers used to share resources with the host are as vulnerable as all other technologies used to provide a segregated development environment, even more so with the presence of complex building blocks such as Kubernetes. This review takes place both within the specific container, reviewing both the container build and potential to escape into the underlying host.

For applicable solutions, the permissions of the container within the cluster or environment are explored, to identify and evaluate the potential for users to breakout and gain additional control of data and potentially compromise the environment.

Need to talk to an expert?

Our Approach

Whatever you're protecting, we apply defence grade cyber security skills whilst taking into consideration the realities of day-to-day business operations. We help our customers to address their known - and their unknown - cyber risks.

Computer Holographic Image

Infrastructure Testing Services

Active Directory Security

Build Review

Firewall Rule Set

Identity and Access Management (IAM)

Lost Device Testing

Network Device Configuration

Vulnerability Scanning

Related Services

Incident & Response

Rapid incident response services minimise disruption and protect critical assets through swift detection, containment, and recovery.
Explore Incident & Response

Penetration Testing

Penetration testing secures your business by defending against threats, securing cloud setups, and pinpointing network weaknesses.
Explore Penetration Testing

Advisory & Strategy

Comprehensive advisory and strategy services help businesses analyze challenges, develop tailored solutions, and achieve sustainable growth.
Explore Advisory & Strategy

Here to Help
Tell Us Your Priorities!