sKan is a tailor-made Kubernetes configuration files and resources scanner that enables developers and DevOps team members to check whether their work complies with security & ops best practices.
More: https://github.com/alcideio/skan
More: https://github.com/alcideio/skan
In this article, you will learn how to use the IAM Authenticator to authenticate to an EKS cluster.
More: https://betterprogramming.pub/kubernetes-authentication-in-aws-eks-using-iam-authenticator-de3a586e885c
More: https://betterprogramming.pub/kubernetes-authentication-in-aws-eks-using-iam-authenticator-de3a586e885c
This article focuses on configuring Kubernetes Audit Logs so you can have records of events happening in your cluster.
More: https://signoz.io/blog/kubernetes-audit-logs
More: https://signoz.io/blog/kubernetes-audit-logs
Forwarded from LearnKube news
Kubernetes doesn't load balance long-lived connections, and some pods might receive more requests than others.
If you're using gRPC, AMQP or any other long-lived connection (e.g. database), you might want to consider client-side load balancing.
More: https://learnk8s.io/kubernetes-long-lived-connections
If you're using gRPC, AMQP or any other long-lived connection (e.g. database), you might want to consider client-side load balancing.
More: https://learnk8s.io/kubernetes-long-lived-connections
KubePi allows administrators to import multiple Kubernetes clusters and assign permissions to different clusters and namespaces.
More: https://github.com/KubeOperator/KubePi
More: https://github.com/KubeOperator/KubePi
awesome-containerized-security is a collection of tools to improve your containerized apps security posture.
More: https://github.com/koslib/awesome-containerized-security
More: https://github.com/koslib/awesome-containerized-security
K8s-gatekeeper is an admission webhook that uses Casbin to apply arbitrary user-defined access control rules to help prevent any operation the administrator doesn't allow.
More: https://github.com/casbin/k8s-gatekeeper
More: https://github.com/casbin/k8s-gatekeeper
Role-based access control (RBAC) is a way of granting users granular access to Kubernetes API resources.
RBAC is a security design that limits access to Kubernetes resources based on the user's role.
Learn how to use RBAC in this tutorial.
More: https://faun.pub/give-users-and-groups-access-to-kubernetes-cluster-using-rbac-b614b6c0b383
RBAC is a security design that limits access to Kubernetes resources based on the user's role.
Learn how to use RBAC in this tutorial.
More: https://faun.pub/give-users-and-groups-access-to-kubernetes-cluster-using-rbac-b614b6c0b383
In this article, you will learn how to scan and discover publicly accessible Kubernetes clusters and how you can protect against it.
More: https://raesene.github.io/blog/2022/07/03/lets-talk-about-kubernetes-on-the-internet
More: https://raesene.github.io/blog/2022/07/03/lets-talk-about-kubernetes-on-the-internet
This project provides an OCI hook to generate seccomp profiles by tracing the syscalls made by the container.
The generated profile would allow all the syscalls made and deny every other syscall.
More: https://github.com/containers/oci-seccomp-bpf-hook
The generated profile would allow all the syscalls made and deny every other syscall.
More: https://github.com/containers/oci-seccomp-bpf-hook
This article will teach you how to exploit a vulnerability in Linux containers by bypassing negative group permissions.
More: https://benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
More: https://benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation