Confidential Computing: Great for Security, not for Privacy
Confidential Computing: Strong security, privacy questions. Elastisys offers EU-based Kubernetes solutions.
Confidential Computing: Strong security, privacy questions. Elastisys offers EU-based Kubernetes solutions.
Security-harden Kubernetes against "unknown unknowns" using network policies, vulnerability management, and an intrusion detection system!
Operating secure Kubernetes platforms requires ability to recover from when disaster strikes. Preparation in the form of frequent backups and training are key to success.
Operating secure Kubernetes platforms requires an alerting culture of clear, prioritized, actionable alerts supporting administrators 24/7.
We explored the functionality, accuracy, performance and usability of function call tracing in Python using ARVOS to detect the runtime usage of known vulnerable code. We found that the approach is functional with 100% accuracy, but with an unfortunate 50% decrease in the performance of the traced application.
Operating secure Kubernetes platforms requires clear boundaries of what is in and out of scope of the team's responsibility. Learn why it's important, how to do it, and the greater context of scope setting.
Access control is about deciding and enforcing who gets to do what in a system. Learn the why, how, and what of Kubernetes access control.
How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations.