Gartner Report - Market Guide for Cloud Workload Protection Platforms (CWPP) Download Report >
{ .link_text }}
CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

Previous Sections This is the sixth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

CKS Certification Study Guide: Supply Chain Security

CKS Certification Study Guide: Supply Chain Security

Previous Sections This is the fifth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

Red Hat Acquires StackRox to Further Expand its Security Leadership

Red Hat Acquires StackRox to Further Expand its Security Leadership

Updated February 22, 2021: As of today, the Red Hat acquisition of StackRox has passed regulatory review and is closed. Red Hat announced the closing of the acquisition in a blog post by Ashesh Badani. The following blog post was originally published on January 7, 2021. Today Red Hat announced a definitive agreement to acquire StackRox. This is an exciting milestone for StackRox and a tremendous validation of our innovative approach to container and Kubernetes security.

CKS Certification Study Guide: Minimize Microservice Vulnerabilities

CKS Certification Study Guide: Minimize Microservice Vulnerabilities

Previous Sections This is the fourth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

CKS Certification Study Guide: System Hardening in Kubernetes

CKS Certification Study Guide: System Hardening in Kubernetes

Previous Sections This is the third installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.

‘Screaming in the Cloud’ - Eliminating Security Risks in Kubernetes

‘Screaming in the Cloud’ - Eliminating Security Risks in Kubernetes

Chris Porter, Director of Solutions Engineering at StackRox recently joined Cloud Economist, Corey Quinn on ‘Screaming in the Cloud’ for a chat about eliminating security risks in Kubernetes. You can listen to the conversation in the podcast episode below, or you can read through the transcript that follows, condensed and modified for clarity. Corey Quinn: Welcome to screaming in the cloud. I’m Corey Quinn. I’m joined on this promoted episode by Chris Porter, Director of Solutions Engineering over at StackRox.

CKS Certification Study Guide: Cluster Hardening

CKS Certification Study Guide: Cluster Hardening

Previous Sections This is the second installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study Tips This blog references tools to set up a Kubernetes version 1.

What’s New in Kubernetes 1.20? New Features and Updates

What’s New in Kubernetes 1.20? New Features and Updates

Kubernetes 1.20 has been released! Congratulations to the Kubernetes release team on this newest version with a release cycle that returned back to a shorter period of 11 weeks following the extended cycle for 1.19 earlier this year. Amid an extremely challenging year and coming on the heels of KubeCon + CloudNativeCon North America, this latest release highlights the rapid pace of innovation and development by the Kubernetes community with a total of 42 feature enhancements, across various stages of maturity, being advanced in 1.

CKS Certification Study Guide: Cluster Setup in Kubernetes

CKS Certification Study Guide: Cluster Setup in Kubernetes

This is the first installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security As we dive into studying for the Certified Kubernetes Security Specialist (CKS) program, make sure to understand the test and its structure.

CVE-2020-8554: Man in the Middle Vulnerability in Kubernetes - Top Recommendations

CVE-2020-8554: Man in the Middle Vulnerability in Kubernetes - Top Recommendations

This week, the Kubernetes Product Security Committee disclosed a new security issue (CVE-2020-8554) that affects every version of Kubernetes. It is medium severity and no patch is available. Kubernetes administrators are advised to (1) limit certain cluster permissions as well as (2) restrict and manually audit external IP usage within clusters. It is also recommended that multi-tenant cluster scenarios be reconsidered where possible and appropriate. Vulnerability Summary CVE-2020-8554 is a man-in-the-middle (MITM) vulnerability that exists in every version of Kubernetes with the most significant impact on multitenant clusters.

How KubeLinter fits in the CNCF Ecosystem

How KubeLinter fits in the CNCF Ecosystem

The State of Kubernetes Security in 2020 There has been a significant shift in the Kubernetes community to security topics in the past year. According to the StackRox State of Container and Kubernetes Security Report, Fall 2020, human error causes most security incidents in Kubernetes, with misconfigurations contributing to roughly 67% of cases reported by survey respondents. At KubeCon and Cloud-Native Con North America, Kubernetes security topics made up the largest percentage of overall sessions this year.