This week's articles
State of Kubernetes Security Report
#kubernetes, #strategy
The State of Kubernetes Security Report examines how companies are adopting Kubernetes, containers, and cloud-native technologies while meeting the challenges of securing their Kubernetes applications.
Announcing the results of Istio's first security assessment
#kubernetes, #istio
The assessment evaluated Istio's architecture as a whole for security related issues with focus on key components like istiod (Pilot), Ingress/Egress gateways, and Istio's overall Envoy usage as its data plane proxy. An important conclusion from the report is that the auditors found no "Critical" issues within the Istio project.
Windows Container Forensics
#docker, #forensics
Post detailing both the research process and useful findings about Windows containers. It primarily focuses on the filesystem layers and does not cover containerised registry hives.
AWS Incident Response Playbook Samples
#aws, #defend
A collection of playbooks covering several common scenarios faced by AWS customers. They outline steps based on the NIST Computer Security Incident Handling Guide, that can be used to gather evidence, contain and then eradicate the incident, recover from the incident, and conduct post-incident activities.
File Permissions: the painful side of Docker
#docker, #explain
The whole issue with file permissions in docker containers comes from the fact that the Docker host shares file permissions with containers (at least, in Linux).
|
|
Tools
aws-security-analytics-bootstrap
AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena analysis environment that's quick to deploy, ready to use, and easy to maintain.
kaniko
kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster.
cloud-native-app
Have you ever wondered what an application architecture would look like if you committed to using mostly all graduated or incubating projects from the Cloud Native Computing Foundation? This repo, the CNCF Projects App, attempts to answer that question with an example expense application that is made up almost exclusively of CNCF projects.
|
|
From the cloud providers
Manage RDP and SSH connectivity at scale with Azure Bastion
Azure Bastion is a fully managed jumpbox-as-a-service that provides secure RDP and SSH connectivity to VMs deployed in any local or peered Azure Virtual Networks. Remote connectivity is established directly from the Azure Portal, over a transport layer security (TLS) connection, to the public IP address of Azure Bastion. From there, Azure Bastion establishes RDP and SSH sessions to the private IP address of the target VMs in the local or peered Virtual Network.
|
|
Thanks for reading!
|
If you found this newsletter helpful, I'd really appreciate if you could forward it to your friends and colleagues! 👌 If you have questions, comments, or feedback, let me know on Twitter ( @lancinimarco / @CloudSecList), or at feedback.cloudseclist.com! Thanks, Marco
|
|
|