Avatar photo
By: Dawn van Hoegaerden

October 28, 2020 12:53 pm

5,526 views

13 Must-Ask Questions about Kubernetes Security in Production

Containers and tools like Kubernetes enable enterprises to automate many aspects of application deployment. Speeding up processes, saving time and money for businesses, as well as improving DevOps productivity are key benefits of moving to microservices. (more…)[…]

Read More


Avatar photo
By: Glen Kosaka

August 21, 2020 12:44 pm

1,602 views

Protect Kubernetes Containers on AWS Using the Shared Responsibility Model

Editor's note: This post was updated on August 17, 2022 Deploying an AWS container security solution is a critical requirement to protect your data and assets running on AWS, including EC2, EKS, ECS, Kubernetes, or RedHat OpenShift. In its ‘Shared Responsibility Model,’ AWS states that the security responsibility is shared between AWS and […]

Read More


Avatar photo
By: Glen Kosaka

November 6, 2019 12:30 pm

1,883 views

How to Create ‘Security Policy as Code’ to Automate Application Security Policies in the CI/CD Pipeline

DevOps and DevSecOps teams can now automatically deploy and update new applications securely using Kubernetes Custom Resource Definition (CRDs)   As DevOps teams integrate their toolchain to enable automated deployment of container-based applications, one aspect has always slowed down a modern cloud-native pipeline: security. And while automated vulnerability scanning is now standard practice, creating […]

Read More


Avatar photo
By: Glen Kosaka

March 12, 2019 11:28 am

1,628 views

Container Segmentation Strategies and Patterns

At a recent container security conference the topic of ‘container segmentation patterns’ came up, and it became clear that many security architects are wrestling with how to best segment workload communication in the dynamic environment of containers. The question was also raised “Is the DMZ dead?” The concept of network segmentation has […]

Read More


Avatar photo
By: Glen Kosaka

August 23, 2018 11:57 am

3,517 views

How to Hack a Kubernetes Container, Then Detect and Prevent It

By Dieter Reuter As we talked about before in this blog, containers are just vulnerable to be attacked as non-container workloads. Hackers can use many of their old tricks on new containers, such as application exploits, network attacks, or phishing scams. In this post and demo, I’ll show how to hack a Kubernetes container […]

Read More


Avatar photo
By: Fei Huang

April 18, 2018 12:21 pm

1,046 views

The Ultimate Guide to Kubernetes Security

By Fei Huang and Gary Duan Containers and tools like Kubernetes enable enterprises to automate many aspects of application deployment, providing tremendous business benefits. But these new deployments are just as vulnerable to attacks and exploits from hackers and insiders as traditional environments, making Kubernetes security a critical component for all deployments. Attacks for ransomware, […]

Read More


Avatar photo
By: Neuvector

February 22, 2018 12:32 pm

776 views

Cryptojacking and Crypto Mining – Tesla, Kubernetes, and Jenkins Exploits

By Gary Duan Tesla and Jenkins have become the latest victims of data infiltration and cryptojacking. In the Tesla case, the exploits started when a Tesla Kubernetes cluster was compromised because the administrative console was not password protected. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the […]

Read More