Choosing the right Kubernetes hosting for your municipality or government organization is crucial. At Guida, we understand your needs for high availility, reliability, and compliance. That’s why our Managed Kubernetes Service (IKS) on the Intermax Cloud is Haven Compliant.
What is Haven Compliance?
Haven is a recognized standard for platform-independent cloud hosting in the public sector. Haven sets strict requirements to ensure cloud solutions are secure, highly available, and interoperable. With this compliance, you can trust that our Kubernetes platform meets the needs of modern government and public organizations.
Key Features and Benefits
Compliancy check results from running the Haven CLI on IKS:
- High Availability
Your critical applications are hosted in multiple data centers (3). If one data center fails, your applications keep running in another. For municipalities, this means services for citizens remain online—no matter what.
- Secure and Up-to-Date Kubernetes Clusters
We keep Kubernetes clusters fully updated and protected. Regular updates and patches mean your environment is always shielded against the latest threats. For example, when a new security vulnerability is discovered, our team acts fast to apply fixes.
- CNCF Kubernetes Conformance
Our platform meets all Cloud Native Computing Foundation (CNCF) requirements. This ensures that you get a Kubernetes environment that works exactly as it should, with no surprises. Compatibility is guaranteed; your applications can move or scale without vendor lock-in.
- Flexible Storage Options
You can choose the best storage for your needs, including ReadWriteOnce (for single access) and ReadWriteMany (for shared access) volumes. For instance, a portal with multiple editors can use shared storage for collaborative work—securely and efficiently.
Security and Compliance
Haven compliance forms our baseline, but we go further:
- Pod Security Standards
All your pods in the cluster meet strict security rules to prevent unauthorized access.
- Default-Deny Network Policy
Only allowed traffic can move between applications. This stops attackers from moving freely if they gain access.
- Container Vulnerability Scanning
Every container image is scanned for security risks (e.g. CVEs) before deployment.
- Comprehensive Audit Trail
Every action is logged. This helps you meet auditing requirements and supports forensic investigations when needed.
Ready for the Future
When you trust Guida, you’re getting more than Kubernetes. You get an entire package designed for the unique challenges faced by public sector IT leaders. Choose a partner who understands compliance, reliability, and security from day one.