
Andy Pitcher engineered security and compliance features across the rancher/security-scan and aquasecurity/kube-bench repositories, focusing on Kubernetes CIS Benchmark support and automation. He delivered new benchmark versions, modernized configuration management, and improved scan accuracy by refining policy checks and validation logic. Using Go, YAML, and shell scripting, Andy implemented infrastructure as code, automated security scanning, and enhanced code quality through standardized linting and refactoring. His work addressed both feature delivery and bug fixes, such as aligning K3s scan logic and clarifying validation errors, resulting in more reliable compliance workflows and maintainable codebases that reduce operational overhead for Kubernetes security assessments.

October 2025 monthly summary for rancher/security-scan: Focused on aligning the K3s security scan with the default read-only port, updating tests and remediation steps to verify the presence of --read-only-port=0 and ensuring the scan accurately assesses the read-only port setting. Resulted in improved accuracy, reduced remediation cycle time, and clearer guidance for customers.
October 2025 monthly summary for rancher/security-scan: Focused on aligning the K3s security scan with the default read-only port, updating tests and remediation steps to verify the presence of --read-only-port=0 and ensuring the scan accurately assesses the read-only port setting. Resulted in improved accuracy, reduced remediation cycle time, and clearer guidance for customers.
September 2025: Implemented CIS Benchmark v1.11 readiness across two repositories, strengthening security posture and automating compliance. kube-bench now supports CIS v1.11 with updated config/files and enhanced documentation; security-scan delivers CIS v1.11 hardening for K3s and RKE2 with checks, mappings, and scanning support. These changes enable faster audit readiness and reduce manual hardening effort across distributions. Techniques used include security automation, policy mapping, config management, and cross-repo collaboration.
September 2025: Implemented CIS Benchmark v1.11 readiness across two repositories, strengthening security posture and automating compliance. kube-bench now supports CIS v1.11 with updated config/files and enhanced documentation; security-scan delivers CIS v1.11 hardening for K3s and RKE2 with checks, mappings, and scanning support. These changes enable faster audit readiness and reduce manual hardening effort across distributions. Techniques used include security automation, policy mapping, config management, and cross-repo collaboration.
Monthly summary for 2025-04 focusing on delivery and quality across Rancher repositories. Highlights include a new CIS Benchmark 1.10 support in the security scanner and a UX/validation improvement in the webhook for cluster creation. Key deliverables by repository: - rancher/security-scan: Security Scan now supports CIS Benchmark 1.10 by including it in directory checks and updating the configuration map and version mappings for Kubernetes 1.10. Commits added cis-1.10 support and configmap updates (ffcb8d961ac81ac7f7590d3e63df529610bddeb0; fe9201f30c2c1b89149fd04db37e7aa10d4b6d74). - rancher/webhook: Fixed cluster name validation error message to accurately reflect the allowed character count, improving feedback during cluster creation. Commit: d00b5d8708979fc299a3e894dd2fe35e01544a36. Overall impact and accomplishments: - Expanded security assessment coverage with CIS Benchmark 1.10 support, enhancing compliance checks for customers. - Reduced provisioning friction with clearer validation messages, leading to smoother cluster creation workflows. - Demonstrated end-to-end workflow improvements from feature addition to user-facing error messaging with minimal customer friction. Technologies/skills demonstrated: - Go-based feature development and config management (config maps, directory checks). - Kubernetes version mapping and validation logic. - Bug triage, targeted fixes, and accompanying commit hygiene (clear messages).
Monthly summary for 2025-04 focusing on delivery and quality across Rancher repositories. Highlights include a new CIS Benchmark 1.10 support in the security scanner and a UX/validation improvement in the webhook for cluster creation. Key deliverables by repository: - rancher/security-scan: Security Scan now supports CIS Benchmark 1.10 by including it in directory checks and updating the configuration map and version mappings for Kubernetes 1.10. Commits added cis-1.10 support and configmap updates (ffcb8d961ac81ac7f7590d3e63df529610bddeb0; fe9201f30c2c1b89149fd04db37e7aa10d4b6d74). - rancher/webhook: Fixed cluster name validation error message to accurately reflect the allowed character count, improving feedback during cluster creation. Commit: d00b5d8708979fc299a3e894dd2fe35e01544a36. Overall impact and accomplishments: - Expanded security assessment coverage with CIS Benchmark 1.10 support, enhancing compliance checks for customers. - Reduced provisioning friction with clearer validation messages, leading to smoother cluster creation workflows. - Demonstrated end-to-end workflow improvements from feature addition to user-facing error messaging with minimal customer friction. Technologies/skills demonstrated: - Go-based feature development and config management (config maps, directory checks). - Kubernetes version mapping and validation logic. - Bug triage, targeted fixes, and accompanying commit hygiene (clear messages).
In March 2025, delivered significant improvements to code quality tooling, Go standard library modernization in the Summarizer, and security hardening. These changes increased maintainability, reduced risk, and improved developer velocity through faster validation and stronger security controls. Key outcomes include standardized linting across the repo, modernization of IO handling, and tightening path/permissions to guard against traversal and unauthorized writes.
In March 2025, delivered significant improvements to code quality tooling, Go standard library modernization in the Summarizer, and security hardening. These changes increased maintainability, reduced risk, and improved developer velocity through faster validation and stronger security controls. Key outcomes include standardized linting across the repo, modernization of IO handling, and tightening path/permissions to guard against traversal and unauthorized writes.
In January 2025, delivered security-focused enhancements for kube-bench by adding CIS Kubernetes Benchmark v1.10 support for Kubernetes 1.28–1.31. This included new YAML configurations for control plane, etcd, master, node, and policies; updated version mappings and comprehensive documentation. The work strengthens the cluster security posture by refining API server, controllers, etcd, and worker node hardening, and tightening pod security standards and network policies. Resulted in improved baseline compliance and easier security audits across clusters.
In January 2025, delivered security-focused enhancements for kube-bench by adding CIS Kubernetes Benchmark v1.10 support for Kubernetes 1.28–1.31. This included new YAML configurations for control plane, etcd, master, node, and policies; updated version mappings and comprehensive documentation. The work strengthens the cluster security posture by refining API server, controllers, etcd, and worker node hardening, and tightening pod security standards and network policies. Resulted in improved baseline compliance and easier security audits across clusters.
December 2024 monthly summary for rancher/security-scan: Implemented a targeted adjustment to the K3s CIS policy check 5.1.5, changing the check from Automated to Manual and updating its scored status to false to prevent false positives from automated passes. The change reflects that K3s does not enforce automountServiceAccountToken to false by default across several core namespaces, so remediation must be performed manually. The update was implemented in the rancher/security-scan repository (commit 0a9114fd15a2ba2212a89ccf08ea4203072dc714) with explicit remediation guidance and examples across namespaces. Impact: improves accuracy of CIS compliance scans, reduces noise from automated scoring, and aligns with security policies. Skills demonstrated: security policy configuration, Kubernetes CIS benchmarks, commit hygiene, traceability, documentation.
December 2024 monthly summary for rancher/security-scan: Implemented a targeted adjustment to the K3s CIS policy check 5.1.5, changing the check from Automated to Manual and updating its scored status to false to prevent false positives from automated passes. The change reflects that K3s does not enforce automountServiceAccountToken to false by default across several core namespaces, so remediation must be performed manually. The update was implemented in the rancher/security-scan repository (commit 0a9114fd15a2ba2212a89ccf08ea4203072dc714) with explicit remediation guidance and examples across namespaces. Impact: improves accuracy of CIS compliance scans, reduces noise from automated scoring, and aligns with security policies. Skills demonstrated: security policy configuration, Kubernetes CIS benchmarks, commit hygiene, traceability, documentation.
November 2024 monthly summary for rancher/security-scan focused on CIS benchmark modernization and maintenance optimization. Key features delivered include updating CIS profile version mappings and adding support for newer CIS versions to expand compliance coverage, and removing local generic profiles in favor of upstream sources to reduce local maintenance. Added a new cis-1.9 generic version and documentation improvements for version_mapping and target_mapping to improve maintainability. No explicit bugs fixed this period; emphasis was on feature delivery and process improvements to strengthen scan accuracy and reduce operational overhead. Technologies and skills demonstrated include configuration management, upstream profile integration, clear commit hygiene, and cross-context (generic, K3s, RKE1/2) security benchmarking alignment.
November 2024 monthly summary for rancher/security-scan focused on CIS benchmark modernization and maintenance optimization. Key features delivered include updating CIS profile version mappings and adding support for newer CIS versions to expand compliance coverage, and removing local generic profiles in favor of upstream sources to reduce local maintenance. Added a new cis-1.9 generic version and documentation improvements for version_mapping and target_mapping to improve maintainability. No explicit bugs fixed this period; emphasis was on feature delivery and process improvements to strengthen scan accuracy and reduce operational overhead. Technologies and skills demonstrated include configuration management, upstream profile integration, clear commit hygiene, and cross-context (generic, K3s, RKE1/2) security benchmarking alignment.
Overview of all repositories you've contributed to across your timeline