Choosing the right Kubernetes hosting for your municipality or government organization is crucial. At Guida, we understand your needs for high availility, reliability, and compliance. That’s why our Managed Kubernetes Service (IKS) on the Intermax Cloud is Haven Compliant.

What is Haven Compliance?

Haven is a recognized standard for platform-independent cloud hosting in the public sector. Haven sets strict requirements to ensure cloud solutions are secure, highly available, and interoperable. With this compliance, you can trust that our Kubernetes platform meets the needs of modern government and public organizations.

Key Features and Benefits

Compliancy check results from running the Haven CLI on IKS:

Haven Compliancy Checks

  1. High Availability

Your critical applications are hosted in multiple data centers (3). If one data center fails, your applications keep running in another. For municipalities, this means services for citizens remain online—no matter what.

  1. Secure and Up-to-Date Kubernetes Clusters

We keep Kubernetes clusters fully updated and protected. Regular updates and patches mean your environment is always shielded against the latest threats. For example, when a new security vulnerability is discovered, our team acts fast to apply fixes.

  1. CNCF Kubernetes Conformance

Our platform meets all Cloud Native Computing Foundation (CNCF) requirements. This ensures that you get a Kubernetes environment that works exactly as it should, with no surprises. Compatibility is guaranteed; your applications can move or scale without vendor lock-in.

  1. Flexible Storage Options

You can choose the best storage for your needs, including ReadWriteOnce (for single access) and ReadWriteMany (for shared access) volumes. For instance, a portal with multiple editors can use shared storage for collaborative work—securely and efficiently.

Security and Compliance

Haven compliance forms our baseline, but we go further:

  • Pod Security Standards

All your pods in the cluster meet strict security rules to prevent unauthorized access.

  • Default-Deny Network Policy

Only allowed traffic can move between applications. This stops attackers from moving freely if they gain access.

  • Container Vulnerability Scanning

Every container image is scanned for security risks (e.g. CVEs) before deployment.

  • Comprehensive Audit Trail

Every action is logged. This helps you meet auditing requirements and supports forensic investigations when needed.

Ready for the Future

When you trust Guida, you’re getting more than Kubernetes. You get an entire package designed for the unique challenges faced by public sector IT leaders. Choose a partner who understands compliance, reliability, and security from day one.