Comparing the Leading Tools That Scan Against the CIS Kubernetes Benchmark Framework
CIS Benchmarks are a focused set of guidelines for the secure configuration, vulnerability detection, and threat remediation of distributed workloads. In this article, we compare the leading tools that scan against the CIS Kubernetes benchmark framework. The post Comparing the Leading Tools That Scan Against the CIS Kubernetes Benchmark Framework ... Read More
Kubernetes Security: CSPM’s Blind Spot
This article focuses on a critical missing component of Cloud Security Posture Management (CSPM): visibility into Kubernetes. Click to read all you need to know about it. The post Kubernetes Security: CSPM’s Blind Spot appeared first on ARMO ... Read More
The Kubernetes Network Security Effect
I’m a firm believer that network security must be a layer in an overall security strategy. As cloud evolves, it’s hard not to notice the network security challenges in this domain. TL;DR: Kubernetes (K8s) has a built-in object (sort of) for managing network security (NetworkPolicy). While it allows the user ... Read More