Introduction to the Cloud Native Security Controls Catalog
Community post by Jon Zeolla, CTO and Co-Founder of Seiso The CNCF Security Technical Advisory Group (“Security TAG”) has provided a wealth of information to assist organizations in the planning and design of secure cloud native…
OSTIF’s audit of CRI-O is complete – high severity issues found and fixed
Community post originally published on the OSTIF blog Open Source Technology Improvement Fund is thrilled to report the results of a security audit of CRI-O. CRI-O is an open source software (OSS) project that is an implementation of the Kubernetes Container…
How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play,…
Kubernetes ephemeral container security
Guest post originally published on Xenit’s blog by Philip Laine, DevOps Engineer at Xenit Attempting to debug a Pod and realizing that you can’t install curl due to security settings has to be a meme at…
A MAP for Kubernetes supply chain security
Guest post originally published on the Nirmata blog by Jim Bugwadia The sharp increase in software supply chain attacks has made securing the build and delivery of software a critical topic. But what does this mean…
Flux Security: More confidence through fuzzing
Project post originally published in the Flux blog by Daniel Holbach Next up in our blog series about Flux Security is how we implemented fuzzing in Flux and its controllers and how that makes things safer…
Argo security automation with OSS-Fuzz
Project post originally published on the Argo blog by Yuan Tang (Akuity), Adam Korczynski and David Korczynski (Ada Logics), Jann Fischer (Red Hat), Henrik Blixt (Intuit) Security is a key priority for the Argo project. In an effort to improve security, the Argo…
Kubernetes security best practices: definitive guide
Guest post originally published on ARMO’s blog by Jonathan Kaftzan, VP Marketing & Business Development at ARMO Introduction Kubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and,…
Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes…
DevSecOps: cybersecurity for cloud native applications
Guest post originally published on SparkFabrik’s blog by SparkFabrik Team DevOps makes software delivery faster and more reliable, but leaves security practices to specialists at the end of the cycle. This can create a bottleneck in the…