DevSecOps solutions provider Alcide has released a beta version of a new solution designed to provide “end-to-end continuous security guardrails” for Kubernetes deployments.
sKan enables developers to scan Kubernetes configuration and deployment files as part of their application development lifecycle including CI pipelines. Developers can scan their Kubernetes deployment files, Helm charts or Kustomized resources.
By applying automation to audit log monitoring, security teams and DevSecOps teams can get ahead of the curve in identifying breaches and vulnerabilities.
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
When a Kubernetes deployment suffers a security breach, it can be difficult for security teams to diagnose and identify the source of the intrusion and its impact. Each Kubernetes cluster may host multiple applications, and each application may be composed of dozens or even hundreds of interacting microservices deployed as pods.
The $3.92 million mistake you can make by refactoring on K8s.
New Kubernetes Node Vulnerability (CVE-2020-8558) bypasses localhost boundary
Kubernetes-as-a-Service: EKS vs. AKS vs. GKE
Subscribe to receive email updates