Executive-ready PDF
One PDF with an executive summary, full technical findings with remediation drafts, and a compliance control mapping - all in one signed, downloadable file.
See a sample report →Ephemera is a read-only posture and compliance audit for your Kubernetes clusters. No agent to install. No data kept. Processing stays inside the region you pick, and every artifact self-deletes in 24-hour. Most audits finish generally in a couple of minutes.
Every audit produces the same artifacts. No tiers, no locked features during the beta. We just want your honest feedback.
One PDF with an executive summary, full technical findings with remediation drafts, and a compliance control mapping - all in one signed, downloadable file.
See a sample report →Every critical comes with a suggested YAML patch, a kubectl command, or a policy snippet you can paste. Ephemera drafts, you review. Nothing is applied automatically.
Export a cluster dump with kubectl cluster-info dump and upload it through the browser, or run our signed, read-only CLI against a live cluster and point it at your cluster. Either way you get the same report.
Findings are cross-referenced with ISO/IEC 27001 Annex A, NIS2 art. 21, NIST CSF 2.0, the EU Cyber Resilience Act (CRA articles 13 and 14), GDPR art. 32, DORA Chapter II, CER art. 13, SOC 2 CC6, and CIS Kubernetes 1.8. Filter by framework in the dashboard.
Track score trends, cluster-by-cluster diffs, scheduled scans, and the retention clock. Slack, email, and webhook delivery on every completed audit.
Open the demo dashboard →A signed retention receipt is generated when every artifact is deleted. The append-only retention log is part of your audit trail. Show it to your auditor, don't just tell them.
Data flow is deliberately short. Nothing crosses a region boundary. Nothing survives past 24 hours.
Upload a cluster dump through the browser, or install the ephemera CLI (one command, signed, open source) and point it at your cluster. Either way you pick the data region (EU or US) before anything moves.
The job lands in a region-pinned worker. Secrets are scrubbed at ingest (regex + entropy). Policy, capacity, images, and compliance checks run in parallel. Ephemera drafts remediations from redacted findings only. No raw manifests ever leave the data plane.
You get the PDF by email (plus Slack / webhook if configured), and a dashboard link while the artifact still exists. A 24-hour countdown begins. When it hits zero the raw dump, findings, and PDF are deleted. A signed retention receipt is added to your permanent audit trail - aggregate scores and finding counts are kept for trend charts, but no raw finding data survives.
No install required. CLI is signed, RBAC is published, only needs get/list.
Your cluster dump, derived findings, and PDF live in Paris (EU). Pick one at upload time and your data stays there, never replicated across regions.
Every job has a countdown. After 24 hours every artifact is gone - confirmed by a signed entry in the retention log. Download the log to verify each deletion against its SHA-256.
The output of roughly kubectl get all,cm,secret,netpol,role,rolebinding -A -o yaml, plus cluster and node metadata. Secret values are stripped at the edge before anything is analysed. We only ever see that a Secret exists, its name, and its mount points. Image digests are kept; image contents are never pulled.
The CLI is read-only: it binds to a dedicated ClusterRole with get, list, and watch on core resources, and nothing else. No mutating API calls, no exec, no port-forward. You can audit the RBAC manifest yourself before running it (it's about 110 lines).
Belt and suspenders: the object storage bucket has a 24-hour lifecycle rule (hard floor), a per-minute cron checks every job's tombstone and deletes on schedule, and the append-only retention log records every delete with a SHA-256 of the original artifact. You can download the log for any audit and confirm the hashes match what you uploaded.
Into the region you picked (EU or US) and nowhere else. The control-plane database holds metadata only (job id, finding counts, retention log entries) and is sharded per region too. There is no cross-region replication of anything derived from a customer cluster. The only external hop is the Anthropic API call for remediation drafting, which only sees already-redacted, anonymized finding descriptions.
Those are excellent open-source scanners and Ephemera actually uses several of them under the hood. The difference is packaging: you get one report instead of five JSON blobs, LLM-drafted remediations instead of raw rule IDs, a data-residency and retention model you can hand to a compliance team, and a dashboard for trends over time. If you want the raw scanner output, it's included in the download.
Not during the private beta. We want to iterate fast without fragmenting support across deployment targets. The CLI itself is open source, and a self-hosted option is something we're planning.
We invite in small batches as capacity grows (usually weekly). Priority goes to teams running multi-cluster production workloads in regulated industries (CRA / NIS2 / DORA / SOC 2 / CIS K8s timelines coming up), because that's the use case we're building against. If that's you, mention it in the why field on the form and you'll jump the queue.
No. Ephemera surfaces technical findings and maps them to framework control IDs, which saves hours of manual cross-referencing. It does not render legal opinions, certify conformance, or replace the human review a certification body, DPO, or internal auditor performs. Treat the output as evidence for their review, not as a sign-off.
Still have a question we didn't answer?
Beta participants keep their entry price for 12 months from sign-up. All tiers bill monthly; an annual plan is available at a discount equivalent to two months free.
Prices in EUR, exclusive of VAT. USD shown with a live FX conversion from EUR. Beta pricing is locked in for 12 months.
The content produced by Ephemera (including findings, framework mappings, remediation drafts, and the "also maps to" cross-framework labels) is provided for informational and engineering purposes only. It is not legal advice, it does not constitute a formal audit or certification, and it does not replace the work of a qualified auditor, data-protection officer, compliance consultant, or certification body.
Framework references (ISO/IEC 27001, NIS2, NIST CSF, EU CRA, GDPR, SOC 2, CIS Kubernetes, and others) link to the original source material. Where a control is cited, the mapping is our best-effort interpretation based on the public text of the framework. You remain responsible for validating the mapping, confirming the control is in scope for your organization, and collecting any additional evidence required by your auditor.
Ephemera is offered without warranty of any kind. Your use of the service is governed by the Terms of Service and Privacy Notice (published at GA).