Our NSA Kubernetes Hardening Guide series has looked at pod security, network access, authentication and authorization, audit logging and threat detection. In the final...Read More
In our series on the NSA Kubernetes Hardening Guide, we’ve looked at pod security, network access and authentication and authorization. Today we look at the audit logging and...Read More
The Kubernetes ecosystem is built on a vast array of open source technologies. Kubernetes itself is one of the largest open source projects, and a community of tools and...Read More
The zero-day vulnerability known as log4j has been described as one of the most serious security issues in recent years, allowing attackers to remotely execute code and gain...Read More
As we head into the new year, I want to share some recent concerns around the log4j vulnerability and the ongoing security of our Fairwinds software. It is critical that our...Read More
In the world of software development and Kubernetes, service ownership means development teams take responsibility for supporting the products they deliver, at every stage of...Read More
The National Security Agency (NSA) released its Kubernetes Hardening Guide in August 2021 (and updated it in March 2022) with recommendations for hardening Kubernetes clustersRead More
Overview: What Is Container Security? Container security protects the integrity of containers, including the applications within them and the infrastructure they rely on....Read More
It’s not an exaggeration to state that cloud native technology is revolutionizing how organizations are developing and delivering applications. As organizations increasingly...Read More
Security Can Be Too Top-Down Security can often feel like a top-down initiative — install an antivirus, do this training so you know how to avoid being phished — that kind of...Read More
As Kubernetes adoption has continued to grow and we’ve seen Kubernetes increase in size and complexity, we’ve also seen a shortage of Kubernetes expertise and Kubernetes...Read More
Securing Kubernetes is a big topic and one that is being addressed by a number of vendors. One of the challenges we see around security is not simply vulnerabilities, but...Read More