<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
5 minute read
| June 15, 2022

NSA Kubernetes Hardening Guide: Upgrade and Application Security

Our NSA Kubernetes Hardening Guide series has looked at pod security, network access, authentication and authorization, audit logging and threat detection. In the final... Read More
5 minute read
| June 10, 2022

NSA Kubernetes Hardening Guide: Audit Logging and Threat Detection Overview

In our series on the NSA Kubernetes Hardening Guide, we’ve looked at pod security, network access and authentication and authorization. Today we look at the audit logging and... Read More
3 minute read
| May 24, 2022

Kubernetes Vulnerability Management: Keep Third-party Images Up-to-Date

The Kubernetes ecosystem is built on a vast array of open source technologies. Kubernetes itself is one of the largest open source projects, and a community of tools and... Read More
3 minute read
| January 5, 2022

How Fairwinds Insights Can Help You Identify log4j Container Vulnerabilities

The zero-day vulnerability known as log4j has been described as one of the most serious security issues in recent years, allowing attackers to remotely execute code and gain... Read More
3 minute read
| December 22, 2021

A Fairwinds Security Statement on The Apache log4j Vulnerability

As we head into the new year, I want to share some recent concerns around the log4j vulnerability and the ongoing security of our Fairwinds software. It is critical that our... Read More
4 minute read
| October 20, 2021

Is Kubernetes Service Ownership the Key to Better Container Security?

In the world of software development and Kubernetes, service ownership means development teams take responsibility for supporting the products they deliver, at every stage of... Read More
6 minute read
| August 10, 2021

A Brief Overview of the NSA Kubernetes Hardening Guide

The National Security Agency (NSA) released its Kubernetes Hardening Guide in August 2021 (and updated it in March 2022) with recommendations for hardening Kubernetes clusters Read More
8 minute read
| July 27, 2021

Validating Container Security with Fairwinds Insights

Overview: What Is Container Security? Container security protects the integrity of containers, including the applications within them and the infrastructure they rely on.... Read More
3 minute read
| July 13, 2021

Discover the Top 5 Kubernetes Security Mistakes You're (Probably) Making

It’s not an exaggeration to state that cloud native technology is revolutionizing how organizations are developing and delivering applications. As organizations increasingly... Read More
5 minute read
| June 17, 2021

Security Is a Service Owner Problem, It’s Not Just for Your CISO

Security Can Be Too Top-Down Security can often feel like a top-down initiative — install an antivirus, do this training so you know how to avoid being phished — that kind of... Read More
6 minute read
| June 4, 2021

What is KSPM? An Intro to Kubernetes Security Posture Management

As Kubernetes adoption has continued to grow and we’ve seen Kubernetes increase in size and complexity, we’ve also seen a shortage of Kubernetes expertise and Kubernetes... Read More
4 minute read
| October 16, 2020

Why you Need Kubernetes Security Policy Enforcement

Securing Kubernetes is a big topic and one that is being addressed by a number of vendors. One of the challenges we see around security is not simply vulnerabilities, but... Read More