The Rust-based Edera project demonstrates a unique approach to container security that addresses cloud-native computing challenges. Let's examine this new, innovative approach to container security, which could be a game-changer in the industry!
...
Earlier this week, Amazon announced the availability of Amazon Linux 2023, its third-generation Linux distribution. With this distribution, Amazon is promising three benefits: a high-security standard, a predictable lifecycle, and deterministic updates.
Last week Microsoft launched a new feature that lets customers run modern applications on Azure Kubernetes Service (AKS) in an isolated and secure form. Initially announced at the last KubeCon, the feature is currently available in public preview.
The Cloud Native Computing Foundation (CNCF) early this month in Seattle hosted the first standalone CloudNativeSecurityCon (CNSCon) North America 2023. The event drew more than 800 attendees and offered 70 sessions. In her keynote, CNCF Executive Director Priyanka Sharma described it as the first open source, vendor-neutral, practitioner-driven conference for security.
Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.
The software development process is getting quicker. Devops teams are under increased pressure to go to market, and they’re able to work quickly, thanks in part to open-source software (OSS) packages.
The pace of software development is accelerating. Devops teams are under more pressure to launch products rapidly, and they are able to do so in part because of open-source software (OSS) tools.
Kinsing is an old-school Linux/Unix Executable and Link format (ELF) malware program that runs a cryptominer and attempts to spread itself to other containers and hosts.
The Kinsing malware is now actively breaching Kubernetes clusters by leveraging known weaknesses in container images and misconfigured, exposed PostgreSQL containers.
The large attack surface of Kubernetes’ default pod provisioning is susceptible to critical security vulnerabilities, some of which include malicious exploits and container breakouts. I believe one of the most effective workload runtime security measures to prevent such exploits is layer-by-layer process monitoring within the container.
Containers have become increasingly popular in recent years, they can be spun up quickly and offer developers the opportunity to deliver projects faster as well as gains in agility, portability and improved lifecycle management.
The Enable Sysadmin community continues to answer key questions about OpenShift and Kubernetes.
Another year has gone by, and what a year it's been! We've had tons of news in the Kubernetes and OpenShift world, and an increasing number of companies are adopting this technology, which is dominating the container-orchestration market.
Last year, I wrote an article about 2021's OpenShift and Kubernetes highlights, and guess what: This is the list for the year 2022! Once again, the Enable Sysadmin community did not fail to contribute their diverse and expert knowledge.
Have fun with this selection of Enable Sysadmin's top articles of 2022 about Kubernetes and OpenShift Container Platform (OCP).
AWS has patched a vulnerability in its Elastic Container Registry (ECR) that was uncovered by Lightspin researcher Gafnit Amiga during an examination of AWS’s ECR APIs.
In the cloud-native space, where applications are purpose built and delivered to run in the cloud, one technology in particular rises above all others — Kubernetes.
Docker is a technology for containerization, while Kubernetes is a tool for orchestrating container deployments. In the subsequent subsections, we will discuss a variety of open-source tools that really are useful for securing Kubernetes clusters.
Container security is a fairly new technology, especially when viewed in the context of the speed of light technology changes in the fourth industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing, but its use is spreading fast, writes Craig De Lucchi, account director of CA Southern Africa.
Red Hat announced an expansion of its open solutions publicly available in AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors that are focused on making it easy to find, test, buy and deploy software that runs on Amazon Web Services (AWS).