Kubernetes audit log – gold mine for security
In the security world, one of the most established methods to identify that a system was compromised, abused or mis-configured is to collect logs of all the activity performed by the system’s users and automated services…
DevClass: "Security researchers go deep on Helm’s code under CNCF audit process"
The Helm project has passed its mandatory CNCF security audit status, apparently with flying colours.
HelpNetSecurity: "Kubernetes security matures: Inside the project’s first audit"
Auditing 1.5 million lines of code is a heroic undertaking. With resources provided by the Cloud Native Computing Foundation (CNCF), the Kubernetes Project leadership created the Security Audit Working Group to perform an audit in an…
How to manage three top Kubernetes security vulnerabilities
This article explains: Kubernetes and security Across various organizations, Kubernetes is being adopted at lightning rates. It is estimated that 60% of organizations have adopted this technology, and the list of companies planning on transitioning to…
Notary Project completes its second audit!
Community post cross-posted on the OSTIF blog by Helen Woeste, Communications Manager, the Open Source Technology Improvement Fund OSTIF is proud to share the results of our second security audit of Notary Project. Notary Project is…
OpenTelemetry Collector completes fuzzing audit
Cross-posted from the OpenTelemetry blog by Adam Korczynski OpenTelemetry is happy to announce the completion of the Collector’s fuzzing audit sponsored by the CNCF and carried out by Ada Logics. The audit marks a significant step in the OpenTelemetry…
Keycloak completes fuzzing audit
Community post by Adam Korczynski, ADA Logics The Keycloak project has completed its fuzzing audit. The audit was carried out by Ada Logics, a UK-based security firm with deep expertise in fuzz testing, and the audit…
Automate Kubernetes Security and Operations with Kyverno Certified Associate (KCA)
Announcing a New CNCF certification for Kyverno Kyverno is an open-source policy engine designed for Kubernetes that allows teams to validate, mutate, and generate configurations, enabling the automation of security policies as code, beyond just audit…
Why Falco’s new response engine is a game changer for open source cloud native security
Project post by the Falco Team and Nigel Douglas Falco achieved CNCF Graduation status on February 29, 2024. Following the celebration of this significant milestone at KubeCon EU in Paris earlier this year, the project has…
Software supply chain compliance and security policies with SignServer, EJBCA, and Chainloop
Member post originally published on the EJBCA by Keyfactor and Chainloop blogs by Ben Dewberry, Product Manager, Signing and Key Management, Keyfactor and Miguel Martinez Trivino, Co-founder, Chainloop A software supply chain is the series of steps…