
KM.ON Use Case

Challenge
KM.ON provides digital services for textile factories working with KARL MAYER machines. They ensure global connectivity to their machines to collect real-time production data for analysis and predictive maintenance. KM.ON’s services are globally dispersed, including China; hence, adopting a cloud-native multi-cloud strategy facilitates this deployment model. Therefore, the security and compliance of the underlying cloud-native infrastructure is non-negotiable.
Solution
KM.ON leveraged the Mitigant Cloud Security Platform to implement the security and compliance requirements outlined for her cloud-native infrastructure. KM.ON operates a complex cloud-native infrastructure composed of AWS and Alibaba Cloud accounts and Kubernetes environments, and ensuring unbeatable security and compliance with this infrastructure is a non-negotiable requirement. Accordingly, KM.ON opted for the Mitigant KSPM and CSPM to achieve these security requirements. The onboarding process was seamless and quick; within five minutes, the Kubernetes clusters were onboarded, and the initial reports were already displayed on the user interface. Essential security metrics, like the most severe vulnerabilities affecting the containers' packages, were shown. The compliance status of the clusters across several compliance benchmarks (CIS, NSA, etc) was displayed. Similarly, the AWS environments were quickly onboarded and automatically analyzed, and the reports were displayed, showing the comprehensive cloud security posture.
Result
KM.ON continuously monitors all her AWS cloud infrastructure and Kubernetes workloads using the Mitigant Cloud security platform. With the provided reports, the compliance violations and vulnerable packages are continually prioritized using Mitigant’s recommendations and afterward fixed. This approach has offered clear visibility of the cloud-native infrastructure powering KM.ON’s sophisticated, digital textile manufacturing infrastructure. In the next phase of KM.ON’s security maturity, the Mitigant Cloud Attack EMulation, would be adopted to harden the cloud-native infrastructure further and enable resilience against cyber attacks.