What is API security?
API security encompasses the strategies, procedures, and solutions employed to defend APIs against threats, vulnerabilities, and unauthorized intrusion.
Nicolas is product marketing manager and focuses mainly on the security of containerized environments and cloud-native applications. For over 20 years in IT, he has specialized in cloud infrastructure, automation and security, and has worked for companies such as EMC, Red Hat and HashiCorp. Outside of work, he loves traveling, discovering new cultures, and especially the foods of all over the world.
API security encompasses the strategies, procedures, and solutions employed to defend APIs against threats, vulnerabilities, and unauthorized intrusion.
Open Policy Agent (OPA) is an open-source, versatile policy engine that facilitates unified and context-aware policy enforcement across various cloud environments.
Exposure management is when companies identify, assess, and mitigate the risk posed by exposed resources, such as networks, applications, data, and other assets.
Linux security ensures the confidentiality, integrity, and availability of Linux-based systems and protects them from hackers, brute-force attacks, and other cyber threats.
A Kubernetes cluster consists of a group of node machines designed to run applications within containers.
Helm Charts streamline the deployment of applications by providing a packaging format that includes all necessary Kubernetes resources.
A container engine is a software tool that automates the process of running applications in isolated, lightweight environments called containers.
File integrity monitoring (FIM) is a set of security practices that continuously verify the authenticity of file systems, operating system components, applications, and databases.
Kubernetes namespaces divide a given cluster into virtual clusters, helping to separate and manage resources while still keeping them within the same physical cluster. By segregating workloads and applying policies per namespace, you can create boundaries that keep your multi-tenant environments safe and organized.
Understanding the nuances of Linux containers is crucial for building robust, secure applications. This blog post provides insights into the practical implementation of containers, focusing on both their strengths and potential pitfalls.
7 essential best practices that every organization should start with
Docker containers leverage the Docker Engine (a platform built on top of Linux containers) to simplify the software development process.
Kubernetes runtime security refers to the measures and practices implemented to protect Kubernetes clusters and the applications running within them during their operational phase.
In Kubernetes, a security context defines privilege and access control settings for a Pod or Container. It allows you to specify security configurations such as user and group IDs, filesystem permissions, and capabilities.
Container monitoring is the process of collecting, analyzing, and reporting metrics and data related to the performance and health of containerized applications and their hosting environments.
Kubernetes role-based access control (RBAC) serves as a foundational security layer within Kubernetes. It is essential for regulating access to the K8s API and its resources, allowing organizations to define user roles with specific permissions to effectively control who can see or interact with what resources within a cluster.
Container runtime security is the combination of measures and technology implemented to protect containerized applications at the runtime stage.
Common security risks associated with Terraform and the 6 essential best practices for terraform security.
Container orchestration involves organizing groups of containers that make up an application, managing their deployment, scaling, networking, and their availability to ensure they're running optimally.
The primary function of admission controllers is the enforcement of custom policies on incoming requests, ensuring that only valid and compliant API requests are executed.
At their core, containers encapsulate the application code and runtime, system tools, dependencies, and settings that enable it to operate in the same way across multiple environments.
A Kubernetes secret is an object in the Kubernetes ecosystem that contains sensitive information (think keys, passwords, and tokens)
Containerization encapsulates an application and its dependencies into a container image, facilitating consistent execution across any host operating system supporting a container engine.
Kubernetes as a service (KaaS) is a model in which hyperscalers like AWS, GCP, and Azure allow you to quickly and easily start a Kubernetes cluster and begin deploying workloads on it instantly.
Kubernetes monitoring involves collecting, analyzing, and acting on performance data and metrics across your clusters.
Containers as a service (CaaS) is a cloud service model that allows users to manage, upload, scale, run, and terminate containers using a service provider's API or web portal.
20 essential security best practices every DevOps team should start with
Take a deep dive into the world of container images and learn their essential role in cloud security.
Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.
Container architecture is a way to package and deploy applications as standardized units called containers.
External Attack Surface Management (EASM) refers to the process of identifying, analyzing, and managing an organization's external attack surface.
9 essential best practices to securing your Kubernetes workloads
8 no-brainer container security best practices + the key components of container architecture to secure
A container registry is a service that stores, manages, and distributes application images. Its architecture is designed to ensure availability by providing a centralized resource for container image discovery, distribution, and deployment.
Container security is the process of securing the container pipeline, the content running inside the containers, and the infrastructure on which the containers run.
Cloud encryption is the process of transforming data into a secure format that's unreadable to anyone who doesn't have the key to decode it.
Microservices security is the practice of protecting individual microservices and their communication channels from unauthorized access, data breaches, and other threats, ensuring a secure overall architecture despite its distributed nature.
A container runtime is the foundational software that allows containers to operate within a host system.
IAM security consists of policies and technologies designed to ensure that only authorized individuals gain access to the relevant resources within an organization.
EKS security refers to the practices, strategies, and technologies that organizations use to protect Amazon Elastic Kubernetes Service (EKS) environments from threats.
Azure Kubernetes Service (AKS) delivers Kubernetes as a managed service in Azure and is popular among organizations looking for a hassle-free Kubernetes solution in the cloud.
Kubernetes Security Posture Management (KSPM) is the practice of monitoring, assessing, and ensuring the security and compliance of Kubernetes environments.
Container security scanning is a process that systematically analyzes container images for vulnerabilities and security issues, allowing developers to address potential threats before they escalate into breaches.
Container image signing is a critical security process for establishing trust. Just as you'd expect a signature to verify the authenticity of a document, image signing does the same for container images—those neat packages that carry your code along with all the necessary parts to run it anywhere.
Looking to make the most of containerization while minimizing risk? Container scanning solutions are a critical line of defense that help ensure the safe and secure deployment of applications.
Continuous integration and continuous delivery (CI/CD) have become the backbone of modern software development, enabling rapid, reliable, and consistent delivery of software products. To bolster your CI/CD pipeline, ensuring resilience against ever-evolving threats, follow the best practices in this guide.
11 essential API security best practices that every organization should start with
The open-source nature of Kubernetes means that it is continually being updated and improved, which introduces new features and functionalities—as well as new vulnerabilities. Understand the most pressing K8 security challenges.
It’s a good idea to consider a range of Kubernetes security tools. Open source solutions can greatly improve the security of your Kubernetes clusters, so this section explores the top 11 open-source Kubernetes security tools that can help to safeguard your Kubernetes environment.
Wiz extends its cloud-native runtime sensor to secure serverless containers, providing deep visibility, blocking, and hunting capabilities for AWS Fargate and Azure Container Apps.
Discover how Wiz extends its existing RBAC with the Custom Roles feature, enabling you to tailor user permissions, maintain security, and stay aligned with business needs.
Ensure that your Kubernetes environments are secure and follow OWASP's Kubernetes Top 10 framework. Generate reports quickly and easily and remediate any issues with actionable insights.
Find out quickly where OS and open-source packages or libraries are deployed in your cloud environments and secure them before potential issues arise.
Secure your applications across the SDLC by deploying only trusted images and monitoring your Kubernetes control plane in near-real time to detect potential threats.
Dive in a Kubernetes attack and see how eBPF and other security best practices can prevent these attacks.
The Wiz admission controller simplifies supply chain security by ensuring only trusted container images can be deployed in Kubernetes environments.
An Introduction to Extended BPF and Its Transformative Impact.
Wiz helps accelerate the machine learning journey for practitioners by protecting their generative AI applications
Ensure that your Docker and Kubernetes environments are secure and compliant with CIS benchmarks. Generate reports quickly and easily and remediate any issues with actionable insights.
Wiz protects AI infrastructure against cloud attacks, allowing data scientists and engineers to focus on deploying more AI applications.
Enhance software security and supply chain risk management with Wiz's agentless scanning technology for effortless SBOM creation
Confidently ensure your Kubernetes environments are compliant with CIS Benchmarks for cloud-managed Kubernetes. Quickly generate compliance reports and remediate any issues without hassle.
Wiz announces new GitOps workflows and Terraform provider, enabling customers to manage policies as code.
Shell commands that once had to be run manually now can be coded into a custom rule and run daily using Wiz agentless workload scanning.
Wiz enhances its Dynamic Scanner to detect publicly exposed, unauthenticated APIs
Wiz extends its cloud analysis with an external scanner, giving customers an attacker's view of their externally exposed resources to reduce noise.
KubeCon 2022 will be full of great presentations and content. Here's our take on the conference sessions (apart from our own) that you shouldn't miss, whether you're onsite or attending virtually.
Wiz will be attending and sponsoring KubeCon for the first time and we have a lot to share regarding how enterprises can better secure their container and Kubernetes environments. Come say hi!