Skip to content
Sidereal

Most security tools tell you your controls are configured. Sidereal tells you they are actually working.

Configuration is not enforcement. A NetworkPolicy can be defined and not enforcing. An admission webhook can be configured and silently disabled. Between the last scan and this moment, any of these controls could have drifted.

Sidereal is a Kubernetes-native operator that actively probes your cluster’s security controls on a continuous schedule, verifies they are operationally effective, and produces the compliance evidence your ISSO needs from a single tool.

Continuous Active Validation

Probes run on configurable schedules, firing real actions against real enforcement layers. Not cached configuration state.

Multi-Framework Compliance

Every result tagged with NIST 800-53, CMMC, CJIS, IRS 1075, HIPAA, NIST 800-171, and Kubernetes STIG controls automatically.

Detection Layer Validation

Fires known-bad syscall patterns, then independently verifies the detection pipeline (Falco/Tetragon) caught them.

ISSO-Ready Reports

Continuous monitoring summaries, POA&M entries, coverage matrices, and OSCAL evidence packages generated from probe results.

SurfaceWhat It Validates
RBACServiceAccount permission boundaries are enforced and denying unauthorized operations
NetworkPolicyEast-west traffic restrictions are actively blocking unauthorized paths at the CNI layer
Admission ControlAdmission policies reject non-compliant workload specs
Secret AccessWorkloads cannot access secrets outside their authorized namespace
Detection CoverageKnown-bad behaviors trigger expected alerts in your detection pipeline
CustomOperator-extensible probe surface for agency-specific controls

Start safe, build confidence, then enforce.

  1. dryRun — validates configuration without executing probes (default on install)
  2. observe — probes execute live, results are recorded, no incidents generated
  3. enforce — full operation with incident creation and IR webhook delivery