Baker Street
← Back to Enterprise

Compliance

Control mapping for regulated environments

Disclaimer: Baker Street is an open-source platform. These mappings show how Baker Street capabilities map to common compliance frameworks. This is informational; not legal advice. Actual compliance depends on your deployment configuration and organizational controls.

SOC 2 Trust Services Criteria

ControlDescriptionBaker Street Capability
CC6.1Logical access securityRBAC-scoped agent permissions, namespace isolation, and allowlisted command sets help implement logical access controls
CC6.6System boundary protectionDefault-deny NetworkPolicies and namespace separation support system boundary enforcement between agents and services
CC7.2System monitoringHMAC-chained audit logging with real-time SIEM forwarding maps to continuous monitoring requirements
CC8.1Change managementSigned container images, SBOM generation, and Kyverno admission policies support change management controls
CC6.3Role-based accessKubernetes RBAC with per-agent service accounts and scoped permissions helps implement role-based access
CC7.1Detection of anomaliesHuman-in-the-loop approval for sensitive actions and audit trail integrity checks support anomaly detection processes

ISO 27001 Annex A

ControlDescriptionBaker Street Capability
A.8Asset managementDeclarative agent manifests and SBOM generation support asset inventory and lifecycle management
A.9Access controlKubernetes RBAC, namespace isolation, and allowlisted commands help implement access control policies
A.12Operations securityPod security contexts (non-root, read-only FS, drop ALL) and seccomp profiles map to operational security controls
A.14System acquisition and developmentSigned images, Kyverno admission policies, and registry restrictions support secure development and acquisition
A.10CryptographyHMAC-chained audit logs, encrypted-at-rest volumes, and cosign image verification help implement cryptographic controls
A.16Information security incident managementTamper-evident audit trails forwarded to external SIEM support incident detection, investigation, and response

CIS Kubernetes Benchmark

ControlDescriptionBaker Street Capability
5.1RBAC and service accountsPer-agent service accounts with least-privilege RBAC bindings help implement CIS RBAC recommendations
5.2Pod securityNon-root, read-only FS, seccomp, drop ALL capabilities, and security contexts map to CIS pod security standards
5.3Network policiesDefault-deny NetworkPolicies with explicit egress allow-lists support CIS network segmentation controls
5.4Secrets managementExternal Secrets Operator with runtime injection from external vaults helps implement CIS secrets management guidance
5.7General policiesKyverno admission policies enforce image provenance, resource limits, and namespace conventions supporting CIS general policy controls