Preventing Yet Another AWS S3 Storage Breach With Tripwire

It seems like everyday you see a new report about a massive data leak caused by someone accidentally exposing files stored in AWS S3 Buckets to everyone on the Internet. Many may remember Verizon’s infamous snafu that leaked data records for 6 million of their customers due to a misconfiguration in their S3 buckets. Since … Read More The post Preventing Yet Another AWS S3 Storage Breach With Tripwire appeared first on The State of Security.
Read more

Securing the Entire Container Stack, Lifecycle, and Pipeline – Part 3

As part of a three-part series on incorporating security into the container environment, I’ve talked all about containers and how to inject security into the pipeline. Let’s now discuss tips on how to secure the container stack. What Do I Mean by “Stack”? What I’m calling the stack in this case refers to all of … Read More The post Securing the Entire Container Stack, Lifecycle, and Pipeline – Part 3 appeared first on The State of Security.
Read more

Securing the Entire Container Stack, Lifecycle and Pipeline – Part 2

I recently introduced a three-part series about injecting security hygiene into the container environment. For the first installment, I provided some background information on what containers are and how the container pipeline works. Let’s now discuss how we can incorporate security into the pipeline. Assessing Images Before Production To secure the pipeline, the first thing … Read More The post Securing the Entire Container Stack, Lifecycle and Pipeline – Part 2 appeared first on The State of Security.
Read more

Securing the Entire Container Stack, Lifecycle and Pipeline – Part 1

With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift while security admins are left struggling to figure out how to secure this new class of assets and the environments they reside in. While containers do increase the complexity of the ecosystem that security admins are responsible for securing, … Read More The post Securing the Entire Container Stack, Lifecycle and Pipeline – Part 1 appeared first on The State of Security.
Read more