alcide

Alcide Blog

Cloud-native Security Provider

Prevent Costly Mistakes that Expose Your Kubernetes Service

Nov 27, 2019 8:03:04 AM / by Adi Sapir posted in kubernetes, devops, alcide advisor, Kubernetes security, "load balancer"

0 Comments

 

 

Publishing a Kubernetes Service

In Kubernetes, a Service is an abstract way to expose an application running on a set of Pods as a network service

With Kubernetes you don’t need to modify your application to use an unfamiliar service discovery mechanism. Kubernetes gives Pods their own IP addresses and a single DNS name for a set of Pods, and can load-balance across them.

This post will describe the different ways used to publish a Kubernetes service, the risks harbored and the methods that can be applied to mitigate those risks.

 

Read More

Alcide Integrates with Datadog to Enable Easy Kubernetes Audit Logs Monitoring and Investigation

Nov 19, 2019 3:00:00 PM / by Karine Regev posted in Kubernetes security, Datadog

0 Comments

In our recent blog about making Kubernetes logs auditing a viable practice we mentioned that in general, audit logs are used in two ways:

Read More

Helm 3 Released - Bye Bye Tiller (And Why SecOps Should Care)

Nov 14, 2019 12:49:29 PM / by Gadi Naor posted in Kubernetes security, Helm

0 Comments

Helm 3 was released yesterday. Here's what it means for security pros.

Read More

Kubernetes Orphaned Resources

Nov 13, 2019 8:16:37 AM / by Guy Moyal posted in cloud security, kubernetes, devops, alcide advisor, Kubernetes security, Advisor

2 Comments

 

The Kubernetes container-orchestration system provides a platform for automating deployments
and operations of application containers across clusters of hosts by defining resources as
manageable Objects. Some of these resources can be managed by other resources automatically
while others can be referenced through metadata fields within the object.

Read More

Kubernetes Audit: Making Log Auditing a Viable Practice Again.

Oct 31, 2019 9:26:57 AM / by Nitzan Niv posted in kubernetes, logs, audit, foresnsics

0 Comments

In the security world, one of the most established methods to identify that a system was compromised, abused or mis-configured is to collect logs of all the activity performed by the system’s users and automated services, and to analyze these logs.

Read More

Pod Security Policy

Oct 24, 2019 10:53:44 AM / by Adi Sapir posted in kubernetes, network security, pod, Kubernetes security

0 Comments

What is Pod Security Policy?

The Pod Security Policy, sometimes called PSP in short, is a Kubernetes resource that allows the enforcement of policy rules during the creation phase of a Pod.
When a PodSecurityPolicy resource is created, it does nothing. In order to use it, the requesting user or target pod’s service account must be authorized to use the policy, by allowing the use verb on the policy.

Read More

Kubernetes Network Policies Best Practices

Oct 6, 2019 9:19:53 AM / by Guest Writer: Twain Taylor posted in kubernetes, network security, firewall

0 Comments

While a lot of people are calling network policies the Kubernetes equivalent of a firewall, they probably wouldn’t be called network policies if that were really the case. Although network policies are comparable to security features like firewalls, they mostly pertain to rules, and therefore a more accurate comparison would be with “firewall rules” or security groups in the Cloud that are used to manage permissions.

Read More

IAM Role Pod Delegation Checks on AWS Kubernetes Clusters

Sep 16, 2019 9:27:49 AM / by Guest Writer: Twain Taylor posted in AWS, cloud security, kubernetes, microservices, devops, IAM Role

0 Comments

 
You can never be too safe when it comes to securing your applications. It’s essential that security is a part of the application framework and not just a protective outer layer. Enterprises are swiftly adopting the microservices architecture because of its numerous benefits. However, security still remains a concern. Kubernetes has emerged as the de-facto container orchestration tool. And, on its own, Kubernetes seems to be decent for managing secrets.

Read More

The New Cloud-Native Security Paradigm- Exciting times for me to join Alcide!

Aug 26, 2019 8:41:22 AM / by Amir Ofek posted in cloud security, kubernetes, microservices, devops

0 Comments

 
 
I am a big believer in Jeff Bezos’s Day 1 philosophy. So when the opportunity came for me to drive Day 1 yet again, I could not resist.

Read More

Secret-Hunting in Kubernetes

Aug 6, 2019 10:19:28 AM / by Guest Writer: Theo Despoudis posted in cloud security, kubernetes, microservices, devops, alcide advisor

1 Comment

 

Applications and workloads running on Kubernetes environment, just like any application, requires secrets to gain access to data stored in the database, 1st / 3rd party services or APIs.
Secrets, however, are only effective if they actually remain secret. When secrets leak, attackers will be able to gain access to sensitive data, services or APIs and can potentially put your entire environment and business at risk.

Read More