<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
17 minute read
| June 1, 2023

SOC 2 Compliance for Kubernetes with Fairwinds Insights

As the pace of digital transformation accelerates, many organizations are adopting Kubernetes for managing their containerized workloads. While Kubernetes brings scalability... Read More
5 minute read
| May 25, 2023

How to Check Host Port Configuration in Kubernetes

In Kubernetes, a host port configuration allows you to expose a port from your container to the host node's interface. This enables external systems to access a service... Read More
10 minute read
| April 13, 2023

How to Meet FedRAMP's Requirements for Container Vulnerability Scanning

The federal government continues to work to increase cybersecurity efforts in the United States, including, of course, in cloud environments. Specifically focused on cloud... Read More
7 minute read
| April 3, 2023

Kubernetes Basics Tutorial: Host IPC Should Not Be Configured

Containers are standard software units that package code with all its dependencies so you can run applications quickly and reliably in one computing environment or another.... Read More
7 minute read
| March 28, 2023

Empower Your Developers by Giving Them a Life Vest for Kubernetes Security

# Insecurity on the water I'm taking sailing lessons with my 12 year old son and he's as excited about it as I am. We have been out twice on a 37 foot sailboat with an... Read More
7 minute read
| March 17, 2023

Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation

Securing Kubernetes workloads is a critical aspect of increasing your overall cluster security. The goal is to ensure that your containers are running with minimal privileges... Read More
10 minute read
| March 14, 2023

Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities

Containers are standard units of software that package code and its related dependencies to enable applications to run reliably in different computing environments. Container... Read More
24 minute read
| March 10, 2023

Why you Need Kubernetes Security Policy Enforcement

Securing Kubernetes is a serious topic, both for organizations already implementing Kube and those that are just getting ready to migrate to the open source container... Read More
10 minute read
| March 8, 2023

2023 Benchmark Kubernetes Report: The State of Kubernetes Workload Security

Moving to the cloud remains an important business initiative for organizations around the world. According to the World Economic Forum, digital transformation can enable... Read More
3 minute read
| February 14, 2023

New Fairwinds Insights Release: Terraform Scanning

When it comes to security issues, time is of the essence. Platform Engineering teams need to be able to catch issues as early in the deployment process as possible and, at... Read More
8 minute read
| January 23, 2023

An Overview of the NSA Kubernetes Hardening Guide

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released the 1.0 version of the Kubernetes hardening guide in August 2021... Read More
14 minute read
| December 13, 2022

The Top Three Kubernetes Security Strategies You Need for 2023

The entire world is trying to move to Kubernetes. At the same time, everyone is afraid that they are going to do something wrong. They fear shipping apps and services that... Read More