OpenShift blog

    November 10, 2020

    OpenShift Networking and Cluster Access Best Practices

    This blog post is part two of a four-part blog series where we discuss various OpenShift security best practices for Designing secure clusters Securing the network and cluster access (topic of this ...

    Michael Foster

    November 3, 2020

    OpenShift Security Best Practices for Kubernetes Cluster Design

    Red Hat’s OpenShift Container Platform (OCP) is a Kubernetes platform for operationalizing container workloads remotely or as a hosted service. OpenShift enables consistent security, built-in ...

    Michael Foster

    October 28, 2020

    KubeLinter: Open Source YAML Linter / HELM Linter for K8s

    Today, I’m excited to announce the launch of KubeLinter, a new open source project from StackRox! KubeLinter analyzes Kubernetes YAML files and Helm charts, and checks them against a variety of best ...

    Viswajith Venugopal

    October 15, 2020

    6 Kubernetes Security Use Cases You Must Prioritize

    Organizations are rapidly moving their Kubernetes applications to production to accelerate feature velocity and drive digital transformation and business growth. Our latest State of Kubernetes ...

    Ajmal Kohgadai

    October 10, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Impact

    The final part of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – analyzes a set of techniques that fall under the category known as ...

    Wei Lien Dang

    October 1, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Lateral Movement

    The eighth installment in our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – examines lateral movement. Following a breach, an attacker ...

    Wei Lien Dang

    September 8, 2020

    Guide to Kubernetes Security Context & Pod Security Policy (PSP)

    Securing pods, and the containers that run as part of them, is a critical aspect of protecting your Kubernetes environments. Among other reasons, pods and containers are the individual units of ...

    Wei Lien Dang

    August 20, 2020

    gRPC Anywhere

    Many applications rely on gRPC to connect services, but a number of modern load balancers still do not support HTTP/2, and, in turn, gRPC. In an earlier blog post, we showed a way to take advantage ...

    Ross Tannenbaum

    August 13, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Discovery

    Part seven of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – examines the technique known as Discovery. The tactics in this ...

    Wei Lien Dang

    August 5, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Credential Access

    Part six of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – covers Credential Access, a set of activities intended for stealing ...

    Wei Lien Dang

    July 27, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Defense Evasion

    The fifth installment in our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – covers Defense Evasion, a grouping of techniques focused on ...

    Wei Lien Dang

    July 19, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Privilege Escalation

    Part four of our nine-part blog series on the various Kubernetes threat vectors and tactics covers Privilege Escalation, which encompasses techniques that enable an attacker to gain additional ...

    Wei Lien Dang