New Year, Better StackRox: Extending Our Lead in Kubernetes-Native Security

New Year, Better StackRox: Extending Our Lead in Kubernetes-Native Security

StackRox is continuing to shape the future of Kubernetes by enabling customers to build, deploy and run cloud-native applications at scale securely. In recent months, we have released several new, important features covered in this post, focusing on enhanced detection capabilities and simplified administrative workflows. This focus drove new protections for the Kubernetes API server, additional context for the Network Graph, support for the syslog protocol, and a simplified Helm chart installation and upgrade process.

What is KubeLinter?

What is KubeLinter?

What is KubeLinter? The KubeLinter is an open-source command-line interface to identify misconfigurations in Kubernetes objects. KubeLinter offers the ability to integrate checks on Kubernetes YAML files and Helm charts before deployment into a Kubernetes cluster. With 19 standard built-in checks and the room to configure your own, you get immediate feedback about misconfigurations and Kubernetes security violations. How Do I Use It? KubeLinter requires very minimal configuration and is used by executing commands in your command-line shell.

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

Providing an update on the core Kubernetes services offered by the big three We are now six years past the initial release of Kubernetes, and it continues to be one of the fastest-growing open-source projects to date. The rapid development and adoption of Kubernetes have resulted in many different implementations of the application. The Cloud Native Computing Foundation (CNCF) currently lists over 90 Certified Kubernetes offerings. To ensure some consistency between platforms, the CNCF focuses on three core tenets;

CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

Previous Sections This is the sixth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

CKS Certification Study Guide: Supply Chain Security

CKS Certification Study Guide: Supply Chain Security

Previous Sections This is the fifth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

Red Hat Acquires StackRox to Further Expand its Security Leadership

Red Hat Acquires StackRox to Further Expand its Security Leadership

Updated February 22, 2021: As of today, the Red Hat acquisition of StackRox has passed regulatory review and is closed. Red Hat announced the closing of the acquisition in a blog post by Ashesh Badani. The following blog post was originally published on January 7, 2021. Today Red Hat announced a definitive agreement to acquire StackRox. This is an exciting milestone for StackRox and a tremendous validation of our innovative approach to container and Kubernetes security.

CKS Certification Study Guide: Minimize Microservice Vulnerabilities

CKS Certification Study Guide: Minimize Microservice Vulnerabilities

Previous Sections This is the fourth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

CKS Certification Study Guide: System Hardening in Kubernetes

CKS Certification Study Guide: System Hardening in Kubernetes

Previous Sections This is the third installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

‘Screaming in the Cloud’ - Eliminating Security Risks in Kubernetes

‘Screaming in the Cloud’ - Eliminating Security Risks in Kubernetes

Chris Porter, Director of Solutions Engineering at StackRox recently joined Cloud Economist, Corey Quinn on ‘Screaming in the Cloud’ for a chat about eliminating security risks in Kubernetes. You can listen to the conversation in the podcast episode below, or you can read through the transcript that follows, condensed and modified for clarity. Corey Quinn: Welcome to screaming in the cloud. I’m Corey Quinn. I’m joined on this promoted episode by Chris Porter, Director of Solutions Engineering over at StackRox.

CKS Certification Study Guide: Cluster Hardening

CKS Certification Study Guide: Cluster Hardening

Previous Sections This is the second installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study Tips This blog references tools to set up a Kubernetes version 1.

What’s New in Kubernetes 1.20? New Features and Updates

What’s New in Kubernetes 1.20? New Features and Updates

Kubernetes 1.20 has been released! Congratulations to the Kubernetes release team on this newest version with a release cycle that returned back to a shorter period of 11 weeks following the extended cycle for 1.19 earlier this year. Amid an extremely challenging year and coming on the heels of KubeCon + CloudNativeCon North America, this latest release highlights the rapid pace of innovation and development by the Kubernetes community with a total of 42 feature enhancements, across various stages of maturity, being advanced in 1.