minesweeper.io
  • Home
  • Features
    • Image Scanning
    • Easy Installation
    • Exception Management
    • Policy Management
  • Docs
  • Blog
  • Contact
  • Certification
Select Page

Using Kubernetes Network Policies to Firewall Your Applications

by Jacob Beasley | Mar 29, 2022 | Uncategorized

One of the recurring principles in security is that of the Principle of Least Privileges – that is to say, we tend to want to give individual applications and users the least amount of privileges necessary to do their job. This has numerous benefits, chief among...

Using Secomp and AppArmor to Prevent Intruders from doing Much Harm

by Jacob Beasley | Mar 29, 2022 | Uncategorized

Whenever an application tries to do anything beyond simple numeric computations, the application must make what is called a kernel call. Examples of kernel calls include everything from opening sockets to accessing files to checking the current system time. Under the...

Using KubeSec to make sure that Your Apps have Limited Privileges

by Jacob Beasley | Mar 29, 2022 | Uncategorized

We have all heard that Kubernetes is Secure and Kubernetes Isolates your Apps, but you will be surprised to learn that actually it is not very secure if you deploy your apps wrong. There are many ways in which apps deployed with Kubernetes can be deployed in insecure...

Using Kube Bench to Make Sure You are Following Kubernetes Security Best Practices

by Jacob Beasley | Mar 29, 2022 | Uncategorized

Kubernetes is extremely flexible. With this flexibility comes a deal of complexity if you want to setup Kubernetes to run securely. There are literally hundreds of options, so how would you possibly decide what parameters should be tuned to what to secure your...

Let’s Hack a Kubernetes Cluster (and then secure it!)

by Jacob Beasley | Nov 12, 2021 | Uncategorized

Ready To Get Started? Sign Up For...

Kubernetes Role Based Access Control, Explained

by Jacob Beasley | Oct 6, 2021 | Uncategorized

Role Based Access Control is how Kubernetes limits what users (or service accounts) can perform what actions. For example, we might say that Jason can deploy pods in a particular namespace, or that Jason is an administrator. It is worth noting that you can deploy...

Using Trivy to Scan Docker Images (and how to patch the vulnerabilities)

by Jacob Beasley | Oct 6, 2021 | Uncategorized

Welcome back for the next installment of our security newsletter! I hope you enjoyed our last article on 3 Kubernetes Security Tools in 3 Minutes. In this article, we are going to give you some boots-on-the-ground guidance on the use of Trivy to perform a scan as well...

3 Tools in 3 Minutes for Securing your Kubernetes Cluster

by Jacob Beasley | Sep 13, 2021 | Uncategorized

This is the one article you need to read. If you read no other article we send you, read this one. In this article, we will quickly intro you to 3 free, open-source tools you can use to secure your Kubernetes Cluster and the Apps Running on it.  I promised 3...

3 Ways to Hack a Kubernetes Cluster (and how to prevent each)

by Jacob Beasley | Sep 13, 2021 | Uncategorized

As you begin your learning about Kubernetes Security, I find it oftentimes instructive to discuss the most common ways that Kubernetes might be exploited by an attacker to escalate privileges, deny access, steal data, or otherwise cause harm.  We will approach...
Next Entries »

Designed by Elegant Themes | Powered by WordPress