Category: Cloud Native Security
-
AKS | SSH to an AKS Node with Kubectl
Read more: AKS | SSH to an AKS Node with KubectlHi, In this article, I will show you how you can create an SSH connection to an AKS node, use kubectl debug to run a privileged container on your node.…
-
AKS | FIPS
Read more: AKS | FIPSHi, The Federal Information Processing Standard (FIPS) 140-2 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. AKS allows you…
-
AKS | Disable Administrator local account
Read more: AKS | Disable Administrator local accountHi, When deploying an AKS Cluster, local accounts are enabled by default. Even when enabling RBAC or Azure Active Directory integration, –admin access still exists, essentially as a non-auditable backdoor…
-
AKS | Attack matrix v2 for Kubernetes
Read more: AKS | Attack matrix v2 for KubernetesHi! In this article, I would like to show you the new version of the attack matrix for Kubernetes. In this previous article, we reviewed the first version of the…
-
AKS Security Audit Toolbox
Read more: AKS Security Audit ToolboxHi! In this article, I would like to share with you a list of security tools to audit the security of your AKS clusters. Kubestriker performs numerous in depth checks on kubernetes…
-
Encrypted customer managed keys policy for AKS
Read more: Encrypted customer managed keys policy for AKSHi, Azure Kubernetes Service (AKS) now supports a new Azure policy to ensure OS and data disks are encrypted via customer managed keys. This feature enhances security by supporting the…