Remove kspm-kubernetes-security-posture-management
article thumbnail

Introducing KSPM by Aqua: Kubernetes Security Posture Management

Aqua Security

With the rapid adoption of Kubernetes, an unforeseen consequence has emerged — there simply aren’t enough trained K8s experts to go around, let alone K8s security experts. Kubernetes environments have increased in size and complexity, expanding its attack surface, and ultimately heightening its susceptibility to exploitation.

article thumbnail

KSPM and Compliance simplified with Runecast

DevOps.com

The post KSPM and Compliance simplified with Runecast appeared first on DevOps.com. London, UK, MAY 16, 2022 – Runecast Solutions Ltd.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Evaluating and Enforcing Least Privilege in Kubernetes with Aqua KSPM

Aqua Security

Overly permissive defaults associated with roles and K8s subjects, such as service accounts, add risks to the attack surface of Kubernetes. And attempting to manually understand these risks and enforce least privilege rights in a Kubernetes environment is time-consuming and prone to human error.

143
143
article thumbnail

5 best practices for securing Kubernetes runtime workloads

Lacework

While hardening Kubernetes workload configuration or Kubernetes Role-Based Access Controls (RBAC) is a necessary best practice, it is just the tip of the iceberg when securing Kubernetes clusters. The Red Hat 2022 State of Kubernetes […] The Red Hat 2022 State of Kubernetes […]

52
article thumbnail

Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development

Tenable

With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Microsoft customers.

Linux 97
article thumbnail

Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security

Tenable

In this post, I will try to demystify the jargon around cloud security, identify the key challenges and explain how cloud native application protection platforms (CNAPPs) provide a unified approach to cloud security. CNAPP must answer the question: “Is my cloud native application secure?”

Cloud 70
article thumbnail

Journey to Containerized Workloads: Security Pitfalls and How To Dodge Them With Tenable Cloud Security 

Tenable

Tenable Cloud Security now includes built-in container security functionality, so you can detect and prevent insecure containers from being deployed to production. In this blog, you’ll learn how Tenable can help you avoid critical container security mistakes. Tenable Cloud Security allows for true DevSecOps.

Cloud 61