Compliance as Code: Why Your Next Audit Will Be a Push of a Button
Until now, compliance has been the natural enemy of agility in many companies. While software …

Preparing for an ISO 27001 audit in many companies still resembles a manual Sisyphean task. For weeks, screenshots of configurations are taken, Excel lists are reconciled, and permission matrices are manually validated. In the dynamic world of Kubernetes, where workloads can change by the second, this static approach is not only inefficient but a significant security risk. Realizing that policies are ineffective only at the audit appointment means losing control over governance.
Today, “Compliance as Code” is no longer optional but mandated by regulations like NIS-2 and DORA for critical infrastructures and the upper mid-market. The focus is shifting away from periodic checks to “Continuous Compliance.” The solution lies in automating the audit process directly within the Cloud-Native infrastructure to continuously compare the current state against the desired state of ISO certification.
To enforce ISO 27001 requirements at the cluster level, using a native policy engine like Kyverno or OPA (Open Policy Agent) is essential. Kyverno offers the advantage of defining policies as standard Kubernetes resources (YAML), lowering the barrier for DevOps teams.
By using ClusterPolicies, we ensure that only container images from signed, trusted sources (e.g., an internal Harbor registry) are allowed. This directly addresses ISO control points for software integrity and protection against malicious code. Instead of checking compliance after the fact, Kyverno’s admission controller actively prevents the launch of non-compliant resources. The result: the infrastructure is “secure by design,” and misconfigurations never reach runtime.
An audit requires proof of control effectiveness. Here, we combine Kyverno with the Policy Reporter to generate graphical dashboards and granular reports.
iso27001.security.com/control: A.12.1.2), technical reports can be directly mapped to the corresponding sections of the ISO framework.This API-first approach allows the current compliance status to be exported with a click or webhook—a strategic advantage that reduces audit duration from weeks to hours.
ISO 27001 places great emphasis on the “Least Privilege” principle. In a Cloud-Native environment, coupling Kubernetes RBAC (Role-Based Access Control) with a central identity provider like Keycloak is crucial.
By integrating Keycloak via OIDC (OpenID Connect), we ensure that user access is centrally managed, audited, and immediately revoked when an employee leaves. The combination of Kyverno (which validates RBAC resources) and Keycloak (which guarantees identity) forms the technical backbone for compliance with access control policies. For companies, this means a drastic reduction in liability risks, as every access to the infrastructure is seamlessly documented and automatically validated.
Automating the auditor transforms compliance from a bureaucratic burden into a strategic accelerator. By using open-source tools like Kyverno, Harbor, and Keycloak within the ayedo ecosystem, companies retain full digital sovereignty without becoming dependent on proprietary compliance tools from large hyperscalers.
At ayedo, we support you in integrating this architecture into your platform so that you can face the next audit with ease. In the next step, we should consider how ArgoCD completes this process through GitOps-based drift detection to ensure that manual changes to the cluster are immediately corrected.
How does Kyverno specifically help with an ISO 27001 audit? Kyverno acts as a digital gatekeeper (admission controller) and examiner. It enforces technical security requirements (e.g., encryption, image origin) as code and generates automated reports on compliance status, which can directly serve as evidence for auditors.
Can automation completely replace a human auditor? No. Automation handles the technical validation of controls (about 70-80% of the effort). The human auditor continues to evaluate organizational processes and the strategic integration of the Information Security Management System (ISMS).
What performance impacts arise from real-time scanning in the cluster? Kyverno is highly optimized. Since it is natively integrated into Kubernetes and reacts to events, the overhead is minimal. Validation occurs at the API request, which is in the millisecond range and does not affect application performance.
How is the revision security of the reports ensured? By streaming compliance events into a central logging stack (e.g., Grafana Loki), all changes and violations are immutably stored with timestamps and metadata. This meets the logging and monitoring requirements according to ISO 27001.
Does this approach also work in multi-cluster environments? Yes. By using fleet management tools or GitOps (ArgoCD), Kyverno policies can be centrally defined and rolled out to any number of clusters. The Policy Reporter can consolidate the results of multiple clusters into a central dashboard.
Until now, compliance has been the natural enemy of agility in many companies. While software …
The Ingress-NGINX Controller maintained by the Kubernetes community (repository …
“We can’t move that to the cloud, it’s a monolith.” We hear this sentence …