Mountain View, CA, USA
Jan 15, 2020 | By Viswajith Venugopal
A few months ago, we published a guide to setting up Kubernetes network policies, which focused exclusively on ingress network policies. This follow-up post explains how to enhance your network policies to also control allowed egress.
Jan 9, 2020 | By Karen Bruner
Kubernetes cluster networking can be more than a bit confusing, even for engineers with hands-on experience working with virtual networks and request routing. In this post, we will present an introduction into the complexities of Kubernetes networking by following the journey of an HTTP request to a service running on a basic Kubernetes cluster.
Jan 2, 2020 | By Ajmal Kohgadai
As 2018 was coming to a close, and the blistering pace of Kubernetes adoption showed no signs of slowing, the first major Kubernetes security vulnerability was discovered in the container orchestrator (CVE-2018-1002105), with a criticality score of 9.8. The vulnerability enabled attackers to compromise clusters via the Kubernetes API server.
Dec 9, 2019 | By Karen Bruner
The release of Kubernetes 1.17 introduces several powerful new features and sees others maturing toward or into general availability. This recap provides a rundown of some of the most notable changes.
Nov 26, 2019 | By Karen Bruner
This post is a companion to the talk I gave at Cloud Native Rejekts NA ’19 in San Diego on how to work around common issues when deploying applications with the Istio service mesh in a Kubernetes cluster. The rise of microservices, powered by Kubernetes, brings new challenges. One of the biggest changes with distributed applications is the need to understand and control the network traffic these microservices generate. Service meshes have stepped in to address that need.
Mar 3, 2019 | By StackRox
Download our definitive guide to implementing a container security strategy across the application development life cycle.
Mar 1, 2019 | By StackRox
Download this guide to learn about the container security challenges to complying with PCI DSS and how StackRox helps bring your container environment into compliance with PCI DSS.
Jan 1, 2019 | By StackRox
If you run workloads in Kubernetes, you know how much important data is accessible through the Kubernetes API—from details of deployments to persistent storage configurations to secrets. The Kubernetes community has delivered a number of impactful security features in 2017 and 2018, including Role-Based Access Control (RBAC) for the Kubernetes API.
Oct 11, 2019 | By StackRox
During this interview, StackRox's Ali Golshan discusses the adoption of Kubernetes and its prevalence today. Watch now to learn more about microservices, containers and Kubernetes.
Oct 9, 2019 | By StackRox
In this presentation, StackRox's Conner Gorman focuses on the Kubernetes security landscape and presents some best practices aimed at reducing the risk and attack surface of your clusters.
Mar 27, 2019 | By StackRox
As more companies scale up their Kubernetes adoption, they face growing security challenges. Kubernetes itself provides many native controls that can help organizations improve their security posture, but often they aren’t fully utilized.