<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[StackRox Community Latest Blog Posts]]></title><description><![CDATA[StackRox.io is the community home for StackRox, KubeLinter, and various security-related topics.]]></description><link>https://www.stackrox.io</link><generator>GatsbyJS</generator><lastBuildDate>Mon, 16 Dec 2024 15:08:34 GMT</lastBuildDate><item><title><![CDATA[Integrating StackRox with Microsoft Sentinel]]></title><description><![CDATA[Configure StackRox to send events to a Microsofts Azure Log Analytics Workspace and respond to these events within Microsoft Sentinel.]]></description><link>https://www.stackrox.io/integrating-stackrox-with-microsoft-sentenial/</link><guid isPermaLink="false">https://www.stackrox.io/integrating-stackrox-with-microsoft-sentenial/</guid><pubDate>Mon, 16 Dec 2024 07:00:00 GMT</pubDate></item><item><title><![CDATA[Introducing the StackRox “central-login” GitHub Action]]></title><description><![CDATA[The StackRox is highlighting a major improvement to your CI/CD pipelines  with the release of a new GitHub Action called “central-login”]]></description><link>https://www.stackrox.io/central-login-github-action/</link><guid isPermaLink="false">https://www.stackrox.io/central-login-github-action/</guid><pubDate>Tue, 12 Dec 2023 08:00:00 GMT</pubDate></item><item><title><![CDATA[Our Path to an Open Source Project and Community]]></title><description><![CDATA[Follow these AWS EKS security best practices for cluster design, networking, image security, Pod runtime security, and more]]></description><link>https://www.stackrox.io/how-to-open-source-your-project/</link><guid isPermaLink="false">https://www.stackrox.io/how-to-open-source-your-project/</guid><pubDate>Wed, 21 Sep 2022 07:00:00 GMT</pubDate></item><item><title><![CDATA[Open Source StackRox Is Now Available]]></title><description><![CDATA[Announcing StackRox as an open source project]]></description><link>https://www.stackrox.io/open-source-stackrox-is-now-available/</link><guid isPermaLink="false">https://www.stackrox.io/open-source-stackrox-is-now-available/</guid><pubDate>Thu, 31 Mar 2022 07:00:00 GMT</pubDate></item><item><title><![CDATA[What is eBPF?]]></title><description><![CDATA[This post covers eBPF, its history, and why it is so engrained in cloud  security tools today
]]></description><link>https://www.stackrox.io/what-is-ebpf/</link><guid isPermaLink="false">https://www.stackrox.io/what-is-ebpf/</guid><pubDate>Mon, 31 May 2021 08:00:00 GMT</pubDate></item><item><title><![CDATA[My Top 10 Security Talks from KubeCon + CloudNativeCon Europe]]></title><description><![CDATA[My top 10 security talks and how you can watch them.]]></description><link>https://www.stackrox.io/my-top-10-security-talks-from-kubecon-cloudnativecon-europe/</link><guid isPermaLink="false">https://www.stackrox.io/my-top-10-security-talks-from-kubecon-cloudnativecon-europe/</guid><pubDate>Fri, 14 May 2021 08:00:00 GMT</pubDate></item><item><title><![CDATA[Welcome to StackRox.io and the StackRox community]]></title><description><![CDATA[Red Hat introduces the StackRox community, the upstream project that will work to open source and manage the code that powers Red Hat Advanced Cluster Security for Kubernetes.
]]></description><link>https://www.stackrox.io/welcome-to-stackrox-io-and-the-stackrox-community/</link><guid isPermaLink="false">https://www.stackrox.io/welcome-to-stackrox-io-and-the-stackrox-community/</guid><pubDate>Tue, 04 May 2021 07:00:00 GMT</pubDate></item><item><title><![CDATA[Top 9 Open Source DevSecOps Tools for Kubernetes]]></title><description><![CDATA[Our top picks of open source tools to secure your workloads. 
]]></description><link>https://www.stackrox.io/top-9-open-source-devsecops-tools-for-kubernetes/</link><guid isPermaLink="false">https://www.stackrox.io/top-9-open-source-devsecops-tools-for-kubernetes/</guid><pubDate>Sat, 27 Mar 2021 08:00:00 GMT</pubDate></item><item><title><![CDATA[GKE Monitoring Best Practices for Better Security and Operability]]></title><description><![CDATA[This post covers GKE monitoring and maintenance best practices for maximum security and operability]]></description><link>https://www.stackrox.io/gke-monitoring-best-practices-for-better-security-and-operability/</link><guid isPermaLink="false">https://www.stackrox.io/gke-monitoring-best-practices-for-better-security-and-operability/</guid><pubDate>Mon, 25 Jan 2021 21:00:00 GMT</pubDate></item><item><title><![CDATA[EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud]]></title><description><![CDATA[Providing an update on the core Kubernetes services offered by the big three]]></description><link>https://www.stackrox.io/eks-vs-gke-vs-aks-jan2021/</link><guid isPermaLink="false">https://www.stackrox.io/eks-vs-gke-vs-aks-jan2021/</guid><pubDate>Mon, 25 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[Guide to GKE Runtime Security for GCP Workloads]]></title><description><![CDATA[This guide discusses GKE runtime security recommendations and best practices to help harden K8s and protect your cloud-native apps]]></description><link>https://www.stackrox.io/guide-to-gke-runtime-security-for-gcp-workloads/</link><guid isPermaLink="false">https://www.stackrox.io/guide-to-gke-runtime-security-for-gcp-workloads/</guid><pubDate>Sun, 24 Jan 2021 07:00:00 GMT</pubDate></item><item><title><![CDATA[Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance & Network Security - Part 4 of 4]]></title><description><![CDATA[This is the last installment in our four-part RKE security blog series.]]></description><link>https://www.stackrox.io/rancher-kubernetes-engine-security-part-4/</link><guid isPermaLink="false">https://www.stackrox.io/rancher-kubernetes-engine-security-part-4/</guid><pubDate>Thu, 21 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security - Part 3 of 4]]></title><description><![CDATA[This is the third installment in our four-part RKE security blog series. ]]></description><link>https://www.stackrox.io/rancher-kubernetes-engine-security-part-3/</link><guid isPermaLink="false">https://www.stackrox.io/rancher-kubernetes-engine-security-part-3/</guid><pubDate>Wed, 20 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[GKE Networking Best Practices for Security and Operation]]></title><description><![CDATA[Securing your GKE cluster’s network traffic and access is crucial for the entire cluster’s security and operation. Follow our recommendations and best practices to protect your Kubernetes network on GKE.]]></description><link>https://www.stackrox.io/gke-networking-best-practices-for-security-and-operation/</link><guid isPermaLink="false">https://www.stackrox.io/gke-networking-best-practices-for-security-and-operation/</guid><pubDate>Sat, 16 Jan 2021 07:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: Monitoring, Logging, and Runtime Security]]></title><description><![CDATA[This blog references tools to set up a Kubernetes version 1.19 cluster and review the CKS - Cluster Setup section.]]></description><link>https://www.stackrox.io/cks-certification-study-guide-monitoring-logging-and-runtime-security/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-monitoring-logging-and-runtime-security/</guid><pubDate>Thu, 14 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: Supply Chain Security]]></title><description><![CDATA[This blog references tools to set up a Kubernetes version 1.19 cluster and review the CKS - Cluster Setup section.]]></description><link>https://www.stackrox.io/cks-certification-study-guide-supply-chain-security/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-supply-chain-security/</guid><pubDate>Tue, 12 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access - Part 2 of 4]]></title><description><![CDATA[This is the second installment in our four-part RKE security blog series.]]></description><link>https://www.stackrox.io/rancher-kubernetes-engine-security-part-2/</link><guid isPermaLink="false">https://www.stackrox.io/rancher-kubernetes-engine-security-part-2/</guid><pubDate>Fri, 08 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: Minimize Microservice Vulnerabilities]]></title><description><![CDATA[This is the latest post in our series of the study guide for the Certified Kubernetes Security Specialist (CKS) program.]]></description><link>https://www.stackrox.io/cks-certification-study-guide-minimize-microservice-vulnerabilities/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-minimize-microservice-vulnerabilities/</guid><pubDate>Wed, 06 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup - Part 1 of 4]]></title><description><![CDATA[This blog will focus on deploying Kubernetes clusters with RKE for on-premises deployments.]]></description><link>https://www.stackrox.io/rancher-kubernetes-engine-security-part-1/</link><guid isPermaLink="false">https://www.stackrox.io/rancher-kubernetes-engine-security-part-1/</guid><pubDate>Mon, 04 Jan 2021 09:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: System Hardening in Kubernetes]]></title><description><![CDATA[The third section of our study guide focuses on minimizing the attack surface in the K8s cluster as well as kernel access.]]></description><link>https://www.stackrox.io/cks-certification-study-guide-system-hardening/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-system-hardening/</guid><pubDate>Sun, 20 Dec 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: Cluster Hardening]]></title><description><![CDATA[The cluster hardening section of the exam focuses on Kubernetes cluster access control. Here's what you need to know about cluster hardening.]]></description><link>https://www.stackrox.io/cks-certification-study-guide-cluster-hardening/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-cluster-hardening/</guid><pubDate>Wed, 16 Dec 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[CKS Certification Study Guide: Cluster Setup in Kubernetes]]></title><description><![CDATA[Studying for CNCF's Certified Kubernetes Security Specialist (CKS) program? Here's our study guide for the cluster setup portion of the exam]]></description><link>https://www.stackrox.io/cks-certification-study-guide-cluster-setup-in-kubernetes/</link><guid isPermaLink="false">https://www.stackrox.io/cks-certification-study-guide-cluster-setup-in-kubernetes/</guid><pubDate>Thu, 10 Dec 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[CVE-2020-8554: Man in the Middle Vulnerability in Kubernetes — Top Recommendations]]></title><description><![CDATA[A new MITM Kubernetes security issue (CVE-2020-8554) was uncovered that affects every version of Kubernetes. Here's what you need to know.]]></description><link>https://www.stackrox.io/cve-2020-8554-man-in-the-middle-vulnerability-in-kubernetes-top-recommendations/</link><guid isPermaLink="false">https://www.stackrox.io/cve-2020-8554-man-in-the-middle-vulnerability-in-kubernetes-top-recommendations/</guid><pubDate>Wed, 09 Dec 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[CKS CNCF Announcement and Exam Study Tips]]></title><description><![CDATA[Certified Kubernetes Security Specialist Certification is now available. Check out this study guide to prepare you for the exam.]]></description><link>https://www.stackrox.io/cks-cncf-announcement-and-exam-study-tips/</link><guid isPermaLink="false">https://www.stackrox.io/cks-cncf-announcement-and-exam-study-tips/</guid><pubDate>Thu, 19 Nov 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[What is CNCF’s CKS Exam and What is Covered?]]></title><description><![CDATA[What is the Certified Kubernetes Security Specialist (CKS)? The CKS is the third Kubernetes-based certification backed by the Cloud Native Computing Foundation (CNCF).]]></description><link>https://www.stackrox.io/what-is-the-cks/</link><guid isPermaLink="false">https://www.stackrox.io/what-is-the-cks/</guid><pubDate>Thu, 12 Nov 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[What’s New in Kubernetes 1.19? New Features and Updates]]></title><description><![CDATA[K8s version 1.19 enhancements emphasize the maturity of Kubernetes, including Ingress and seccomp becoming GA, TLS 1.3 support, and more]]></description><link>https://www.stackrox.io/what-s-new-in-kubernetes-1-19/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-in-kubernetes-1-19/</guid><pubDate>Wed, 19 Aug 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[GKE Security Best Practices: Designing Secure Clusters]]></title><description><![CDATA[Learn about the best practices for securely designing and operating Google Kubernetes Engine (GKE) clusters.]]></description><link>https://www.stackrox.io/gke-security-best-practices-designing-secure-clusters/</link><guid isPermaLink="false">https://www.stackrox.io/gke-security-best-practices-designing-secure-clusters/</guid><pubDate>Tue, 21 Jul 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Mitigating CVE-2020-10749 in Kubernetes Environments]]></title><description><![CDATA[A vulnerability that might enable a man-in-the-middle attack on Kubernetes clusters, CVE-2020-10749 was recently disclosed. Here's how to find out if you are impacted and steps you should take to fix this vuln.]]></description><link>https://www.stackrox.io/mitigating-kubernetes-cve-2020-10749/</link><guid isPermaLink="false">https://www.stackrox.io/mitigating-kubernetes-cve-2020-10749/</guid><pubDate>Fri, 05 Jun 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes Security 101: Risks and 29 Best Practices]]></title><description><![CDATA[Tackling Kubernetes security can be challenging — follow these proven best practices across build, deploy, and runtime phases of container life cyle]]></description><link>https://www.stackrox.io/kubernetes-security-101/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-security-101/</guid><pubDate>Fri, 15 May 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[AWS EKS Monitoring Best Practices for Stability and Security]]></title><description><![CDATA[Follow our guidelines for building comprehensive monitoring to provide visibility into the EKS health and detect unauthorized activity and other security incidents.
]]></description><link>https://www.stackrox.io/aws-eks-monitoring-best-practices-for-stability-and-security/</link><guid isPermaLink="false">https://www.stackrox.io/aws-eks-monitoring-best-practices-for-stability-and-security/</guid><pubDate>Tue, 14 Apr 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[EKS Runtime Security Best Practices for AWS Workloads]]></title><description><![CDATA[Following security best practices for running your workloads on EKS plays a crucial part in keeping the cluster and all its workloads safe.]]></description><link>https://www.stackrox.io/eks-runtime-security-best-practices-for-aws-workloads/</link><guid isPermaLink="false">https://www.stackrox.io/eks-runtime-security-best-practices-for-aws-workloads/</guid><pubDate>Mon, 06 Apr 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[EKS Networking Best Practices for Security and Operation]]></title><description><![CDATA[Follow these EKS networking best practices to protect your Kubernetes network on EKS and ensure its security and operation]]></description><link>https://www.stackrox.io/eks-networking-best-practices/</link><guid isPermaLink="false">https://www.stackrox.io/eks-networking-best-practices/</guid><pubDate>Mon, 30 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Securing EKS Cluster Add-ons: Dashboard, Fargate, EC2 Components, and More]]></title><description><![CDATA[This blog post expands on the EKS cluster security discussion and identifies security best practices for your critical cluster add-ons.]]></description><link>https://www.stackrox.io/securing-eks-cluster-add-ons-dashboard-fargate-ec2-components-and-more/</link><guid isPermaLink="false">https://www.stackrox.io/securing-eks-cluster-add-ons-dashboard-fargate-ec2-components-and-more/</guid><pubDate>Tue, 24 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[What's New in Kubernetes 1.18? New Features and Updates]]></title><description><![CDATA[1.18 features include enhanced security options, improved support for Windows, multiple extensions to the Container Storage Interface, and more]]></description><link>https://www.stackrox.io/what-s-new-in-kubernetes-1-18-enhancements-and-feature-updates/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-in-kubernetes-1-18-enhancements-and-feature-updates/</guid><pubDate>Mon, 23 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Guide to Designing EKS Clusters for Better Security]]></title><description><![CDATA[In this blog post, we will provide a set of guidelines to help you design your EKS clusters without compromising security.]]></description><link>https://www.stackrox.io/guide-to-eks-cluster-design-for-better-security/</link><guid isPermaLink="false">https://www.stackrox.io/guide-to-eks-cluster-design-for-better-security/</guid><pubDate>Tue, 17 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[What’s new in Istio 1.5? New Features and Capabilities]]></title><description><![CDATA[Istio 1.5 release combines some major architectural and API changes with increased automation and tooling. This post covers some of the highlights.]]></description><link>https://www.stackrox.io/what-s-new-in-istio-1-5-new-feature-and-capabilities/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-in-istio-1-5-new-feature-and-capabilities/</guid><pubDate>Thu, 12 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Azure Kubernetes (AKS) Security Best Practices Part 4 of 4: Cluster Maintenance]]></title><description><![CDATA[Part 4 of our 4-part AKS security best practices blog series covers operational tasks required to keep your AKS clusters and infrastructure secure.]]></description><link>https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-4-of-4/</link><guid isPermaLink="false">https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-4-of-4/</guid><pubDate>Mon, 09 Mar 2020 07:00:00 GMT</pubDate></item><item><title><![CDATA[Azure Kubernetes (AKS) Security Best Practices Part 3 of 4: Runtime Security]]></title><description><![CDATA[Secure the application runtimes for AKS cluster workloads with these best practices and tools and controls to enforce the best practices]]></description><link>https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-3-of-4/</link><guid isPermaLink="false">https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-3-of-4/</guid><pubDate>Mon, 24 Feb 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[Azure Kubernetes (AKS) Security Best Practices Part 2 of 4: Networking]]></title><description><![CDATA[In this article (part 2 of 4), we discuss AKS cluster networking and how to  protect your network from external attacks and internal misconfigurations]]></description><link>https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-2-of-4/</link><guid isPermaLink="false">https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-2-of-4/</guid><pubDate>Tue, 11 Feb 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[Azure Kubernetes (AKS) Security Best Practices Part 1 of 4: Designing Secure Clusters and Container Images]]></title><description><![CDATA[In this article (part 1 of 4), we discuss what you need to know to securely create your AKS clusters and container images.]]></description><link>https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-1-of-4/</link><guid isPermaLink="false">https://www.stackrox.io/azure-kubernetes-aks-security-best-practices-part-1-of-4/</guid><pubDate>Mon, 27 Jan 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes Networking Demystified: A Brief Guide]]></title><description><![CDATA[Kubernetes networking is complicated. This post demystifies Kubernetes networking by following the journey of an HTTP request to a service running on a K8s cluster.]]></description><link>https://www.stackrox.io/kubernetes-networking-demystified/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-networking-demystified/</guid><pubDate>Thu, 09 Jan 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[Top 5 Kubernetes Vulnerabilities of 2019 — the Year in Review]]></title><description><![CDATA[Here are five of the most risky Kubernetes security vulnerabilities of 2019 you should protect yourself on Kubernetes journey into 2020]]></description><link>https://www.stackrox.io/top-5-kubernetes-vulnerabilities-of-2019-the-year-in-review/</link><guid isPermaLink="false">https://www.stackrox.io/top-5-kubernetes-vulnerabilities-of-2019-the-year-in-review/</guid><pubDate>Thu, 02 Jan 2020 08:00:00 GMT</pubDate></item><item><title><![CDATA[What’s New in Kubernetes 1.17: A Deeper Look at New Features]]></title><description><![CDATA[The release of Kubernetes 1.17 introduces several new features and sees others maturing. This recap provides a rundown of the most notable changes]]></description><link>https://www.stackrox.io/what-s-new-in-kubernetes-1-17-in-depth-analysis-of-new-features-and-improvements/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-in-kubernetes-1-17-in-depth-analysis-of-new-features-and-improvements/</guid><pubDate>Mon, 09 Dec 2019 22:00:00 GMT</pubDate></item><item><title><![CDATA[What’s New in Istio 1.4?]]></title><description><![CDATA[We take a deep dive into how the latest version of Istio (1.4.0) improves the operability and performance of Istio for production users.]]></description><link>https://www.stackrox.io/what-s-new-in-istio-1-4/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-in-istio-1-4/</guid><pubDate>Fri, 22 Nov 2019 08:00:00 GMT</pubDate></item><item><title><![CDATA[SOC 2 Compliance in Container and Kubernetes Environments]]></title><description><![CDATA[A definitive guide to helping you pass SOC 2 audit and compliance for your container and Kubernetes apps and build trust with your customers]]></description><link>https://www.stackrox.io/soc-2-compliance-in-container-and-kubernetes-environments/</link><guid isPermaLink="false">https://www.stackrox.io/soc-2-compliance-in-container-and-kubernetes-environments/</guid><pubDate>Thu, 07 Nov 2019 08:00:00 GMT</pubDate></item><item><title><![CDATA[Patches for CVE-2019-11253 released: Why you should upgrade your Kubernetes clusters immediately]]></title><description><![CDATA[The Kubernetes team has released patches for the recently disclosed “Billion Laughs". Here's what you must do immediately]]></description><link>https://www.stackrox.io/patches-for-cve-2019-11253-released-why-you-should-upgrade-your-kubernetes-clusters-immediately/</link><guid isPermaLink="false">https://www.stackrox.io/patches-for-cve-2019-11253-released-why-you-should-upgrade-your-kubernetes-clusters-immediately/</guid><pubDate>Wed, 16 Oct 2019 17:00:00 GMT</pubDate></item><item><title><![CDATA[Protecting Kubernetes API Against CVE-2019-11253 (Billion Laughs Attack) and Other Vulnerabilities]]></title><description><![CDATA[The parsing of YAML manifests by the Kubernetes API server could lead to a DOS attack against a cluster’s Kubernetes API service, leading to a “billion laughs” attack]]></description><link>https://www.stackrox.io/protecting-kubernetes-api-against-cve-2019-11253-billion-laughs-attack/</link><guid isPermaLink="false">https://www.stackrox.io/protecting-kubernetes-api-against-cve-2019-11253-billion-laughs-attack/</guid><pubDate>Mon, 30 Sep 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes 1.16: Important Features for Operational Excellence]]></title><description><![CDATA[This week marked the release of Kubernetes 1.16 and, like previous releases, delivers a range of new features and enhancements that showcase its rapid velocity and maturity, driven by a community of more than 32,000 individual contributors.]]></description><link>https://www.stackrox.io/kubernetes-1-16-important-features-for-operational-excellence/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-1-16-important-features-for-operational-excellence/</guid><pubDate>Thu, 19 Sep 2019 07:02:00 GMT</pubDate></item><item><title><![CDATA[Beyond Patching: Fixing kubectl cp CVE-2019-11251]]></title><description><![CDATA[To address CVE-2019-11251, update kubectl to 1.13.11, 1.14.7, 1.15.4, or 1.16.0, but patching alone for kubectl cp may not be enough]]></description><link>https://www.stackrox.io/beyond-patching-fixing-kubectl-cp-vulnerabilities/</link><guid isPermaLink="false">https://www.stackrox.io/beyond-patching-fixing-kubectl-cp-vulnerabilities/</guid><pubDate>Thu, 19 Sep 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[What is container security?]]></title><description><![CDATA[Learn about Docker container security challenges as well as best practices for hardening Docker and protecting containers during runtime
]]></description><link>https://www.stackrox.io/docker-security-101/</link><guid isPermaLink="false">https://www.stackrox.io/docker-security-101/</guid><pubDate>Fri, 13 Sep 2019 08:00:00 GMT</pubDate></item><item><title><![CDATA[Amazon EKS Security Best Practices]]></title><description><![CDATA[Follow these AWS EKS security best practices for cluster design, networking, image security, Pod runtime security, and more]]></description><link>https://www.stackrox.io/amazon-eks-security-best-practices/</link><guid isPermaLink="false">https://www.stackrox.io/amazon-eks-security-best-practices/</guid><pubDate>Fri, 13 Sep 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[The Kubernetes Security Audit: 3 Key Takeaways]]></title><description><![CDATA[We read through all 241 pages of recent Kubernetes security audit results to identify the key takeaways — there’s a lot of good content, but here’s the tl;dr:]]></description><link>https://www.stackrox.io/the-kubernetes-security-audit-3-key-takeaways/</link><guid isPermaLink="false">https://www.stackrox.io/the-kubernetes-security-audit-3-key-takeaways/</guid><pubDate>Mon, 02 Sep 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[How to Remediate Kubernetes Security Vulnerability: CVE-2019-11247]]></title><description><![CDATA[CVE-2019-11247 discloses a serious vulnerability in the K8s API that could allow users to read, modify or delete cluster-wide custom resources, even if they only have RBAC permissions for namespaced resources.]]></description><link>https://www.stackrox.io/how-to-remediate-kubernetes-security-vulnerability-cve-2019-11247/</link><guid isPermaLink="false">https://www.stackrox.io/how-to-remediate-kubernetes-security-vulnerability-cve-2019-11247/</guid><pubDate>Mon, 05 Aug 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[What's new in Kubernetes 1.15? Stability, extensibility, and continuous improvement]]></title><description><![CDATA[The first thing that jumps out about Kubernetes 1.15 is that it introduces relatively few new features, a sign that the project has reached a certain level of stability and maturity]]></description><link>https://www.stackrox.io/what-s-new-kubernetes-1-15-stability-extensibility-and-continuous-improvement/</link><guid isPermaLink="false">https://www.stackrox.io/what-s-new-kubernetes-1-15-stability-extensibility-and-continuous-improvement/</guid><pubDate>Fri, 21 Jun 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[New Kubernetes Security Vulnerabilities Disclosed: CVE-2019-1002101 and CVE-2019-9946]]></title><description><![CDATA[New Kubernetes security vulnerabilities discovered: CVE-2019-1002101, a high severity issue, and CVE-2019-9946, a medium severity issue. Read on for a description of the vulnerabilities.
]]></description><link>https://www.stackrox.io/new-kubernetes-security-vulnerabilities-discovered-cve-2019-1002101-and-cve-2019-9946/</link><guid isPermaLink="false">https://www.stackrox.io/new-kubernetes-security-vulnerabilities-discovered-cve-2019-1002101-and-cve-2019-9946/</guid><pubDate>Fri, 29 Mar 2019 07:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes 1.14 is Out — What Are the New Features?]]></title><description><![CDATA[Here's what's new in the Kubernetes 1.14 release, including major features and security improvements to small things that simplify the life of operators]]></description><link>https://www.stackrox.io/kubernetes-1-14-is-out/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-1-14-is-out/</guid><pubDate>Thu, 28 Mar 2019 08:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes API DoS Vulnerability — Top Recommendations]]></title><description><![CDATA[CVE-2019-1002100 is a denial of service (DoS) vulnerability that exists in the Kubernetes API server. Follow these recommendations to protect yourself]]></description><link>https://www.stackrox.io/kubernetes-api-dos-vulnerability-top-recommendations/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-api-dos-vulnerability-top-recommendations/</guid><pubDate>Sat, 02 Mar 2019 00:30:29 GMT</pubDate></item><item><title><![CDATA[The runC Vulnerability — A Deep Dive on Protecting Yourself]]></title><description><![CDATA[The runC vulnerability provides a potent path for attack, but you have several means of protecting your container environments.]]></description><link>https://www.stackrox.io/the-runc-vulnerability-a-deep-dive-on-protecting-yourself/</link><guid isPermaLink="false">https://www.stackrox.io/the-runc-vulnerability-a-deep-dive-on-protecting-yourself/</guid><pubDate>Thu, 21 Feb 2019 10:00:00 GMT</pubDate></item><item><title><![CDATA[7 Critical Kubernetes Security Issues Resolved by Upgrading Your k8s]]></title><description><![CDATA[Are you using the latest version of Kubernetes? Here are top security reasons why you should upgrade your Kubernetes clusters!]]></description><link>https://www.stackrox.io/critical-kubernetes-security-issues-resolved-in-latest-kubernetes-versions/</link><guid isPermaLink="false">https://www.stackrox.io/critical-kubernetes-security-issues-resolved-in-latest-kubernetes-versions/</guid><pubDate>Thu, 03 Jan 2019 08:00:00 GMT</pubDate></item><item><title><![CDATA[Kubernetes First Major Security Vulnerability Discovered]]></title><description><![CDATA[The first major security hole has been discovered in Kubernetes called CVE-2018-1002105]]></description><link>https://www.stackrox.io/kubernetes-first-major-security-hole-discovered/</link><guid isPermaLink="false">https://www.stackrox.io/kubernetes-first-major-security-hole-discovered/</guid><pubDate>Wed, 05 Dec 2018 13:00:00 GMT</pubDate></item></channel></rss>