Skip to content

Introduction

Sidereal is a Kubernetes-native operator for continuous security control validation on federal systems. It runs targeted, low-impact probes against a live cluster to verify that security controls are operationally effective, not merely configured.

Federal systems running on Kubernetes face a gap that no existing open-source tool closes.

Configuration is not enforcement. A NetworkPolicy can be defined and not enforcing. An admission webhook can be configured and silently disabled. A Falco rule can be deployed and suppressed by a config change. That drift is where real-world compromises happen and where ATO evidence goes stale.

The swivel chair. Today, an ISSO validating Kubernetes security controls pivots between disconnected tools: Kubescape for posture, Falco dashboards for detection, the SIEM for audit records, manual crosswalks to NIST 800-53, hand-built reports, spreadsheet POA&Ms. Each tool covers one piece. None of them connect the pieces. The ISSO becomes the integration layer.

Point-in-time is not continuous monitoring. A scan that ran at 2 AM does not tell you whether your controls are working at 2 PM. The gap between scans is the gap in your evidence.

Sidereal continuously probes your cluster’s security controls, verifies they are working, and produces compliance evidence from a single tool:

  • Active probing: fires real actions against real enforcement layers
  • Detection validation: fires known-bad syscalls, independently confirms alerts were raised
  • Multi-framework mapping: tags every result with all active compliance framework controls
  • Report generation: continuous monitoring summaries, POA&M, coverage matrices, evidence packages
  • Graduated adoption: dryRun to observe to enforce, so ISSOs can validate before activating incident pipelines
RequirementMinimum VersionNotes
Kubernetes cluster1.28+kind, minikube, or a real cluster
Helm3.12+
kubectl1.28+
Admission controllerKyverno 1.11+ or Gatekeeper 3.14+Only needed for admission probes
Detection backendFalco 0.37+ or Tetragon 1.0+Only needed for detection probes

RBAC, Secret, and NetworkPolicy probes work on any Kubernetes cluster without additional tooling.