Cloudfleet is built with security at every layer. From encrypted networks and hardened control planes to fine-grained access controls and compliance readiness, we protect your Kubernetes infrastructure so you can focus on your workloads.
Cloudfleet encrypts all data in transit and at rest. Control plane communication, API traffic, and node-to-node networking are secured with TLS. Kubernetes secrets and the Kubernetes backend data stores are encrypted at rest. Cluster nodes connect through a WireGuard®-based encrypted overlay network, ensuring secure communication across clouds and regions. This is a step up for any infrastructure target, as Cloudfleet enforces encryption regardless of whether the underlying network provides it. Learn more about our networking architecture.
Every cluster operates in its own isolated network environment. Nodes are connected through encrypted tunnels, and control plane endpoints can be restricted to private networks on Enterprise plans. Network policies allow you to control traffic flow between workloads at the pod level. As a multi-cloud solution, Cloudfleet network policies can serve as a firewall between datacenter and cloud boundaries, giving you consistent security controls across all environments.
Cloudfleet manages the Kubernetes control plane in a dedicated, secure environment. Control plane components are deployed with least-privilege configurations, regularly patched, and monitored for anomalies. Multi-AZ replication ensures high availability on Pro and Enterprise plans.
Worker nodes are provisioned on demand and recycled regularly, reducing the window of exposure.
Kubernetes secrets are encrypted at rest in the Kubernetes backend. Cloudfleet supports integration with external secret management solutions. Service account tokens use short-lived, bound tokens following Kubernetes best practices.
Cloudfleet maintains strict internal security practices to protect customer infrastructure. Our operational security model is designed to minimize risk and ensure accountability.
All Cloudfleet employee access to production infrastructure requires multi-factor authentication, follows least-privilege principles, and is logged for audit purposes. Access is reviewed regularly and revoked promptly when no longer needed.
We continuously scan our infrastructure and application stack for vulnerabilities. Critical CVEs are patched within 24 hours. We maintain a responsible disclosure program and welcome security reports at security@cloudfleet.ai.
Cloudfleet maintains a documented incident response process with defined severity levels, escalation paths, and communication procedures. Customers on Enterprise plans receive direct incident notifications and post-incident reports.
All infrastructure components are monitored 24/7 for anomalous behavior, unauthorized access attempts, and performance degradation. Alerts trigger automated responses and on-call engineer notifications.
Container images used in the Cloudfleet platform are built from verified sources, scanned for vulnerabilities, and signed. We track dependencies and respond quickly to upstream security advisories.
Comprehensive audit logs capture all administrative actions, API calls, and infrastructure changes. Logs are retained and available for compliance reviews. Kubernetes audit logs are available for customer clusters.
Fine-grained role-based access control (RBAC) with organization and project scopes, least-privilege permissions, and comprehensive audit trails for all user actions.
Enterprise Single Sign-On (SSO) via SAML and OIDC, integrating with Okta, Microsoft Entra ID, Google Workspace, and other compatible identity providers.
Governance, centralized audit logging, and compliance readiness aligned with SOC 2 and ISO 27001 standards (certifications in progress).
Create your free Cloudfleet Kubernetes cluster in minutes - no setup hassle, no cost. Get started instantly with the always-free Basic plan.