The thousand piece puzzle: Supply Chain Security for Kubernetes Clusters

kubernetes security
2025-01-09
By Thomas Kooi

In de huidige digitale wereld is supply chain-beveiliging belangrijker dan ooit. Incidenten zoals de SolarWinds-aanval hebben laten zien hoe één kwetsbaarheid de hele softwareontwikkelingsketen kan beïnvloeden—van codecommits tot de productieomgeving. Dit soort aanvallen kunnen grote gevolgen hebben, niet alleen voor de getroffen organisaties, maar ook voor hun klanten en partners. Dit benadrukt hoe belangrijk het is om elke schakel in de keten proactief en grondig te beveiligen om risico’s te beperken en vertrouwen te behouden.

Lees artikel

Latest Posts

The thousand piece puzzle: Supply Chain Security for Kubernetes Clusters

In de huidige digitale wereld is supply chain-beveiliging belangrijker dan ooit. Incidenten zoals de SolarWinds-aanval hebben laten zien hoe één kwetsbaarheid de hele softwareontwikkelingsketen kan beïnvloeden—van codecommits tot de productieomgeving. Dit soort aanvallen kunnen grote gevolgen hebben, niet alleen voor de getroffen organisaties, maar ook voor hun klanten en partners. Dit benadrukt hoe belangrijk het is om elke schakel in de keten proactief en grondig te beveiligen om risico’s te beperken en vertrouwen te behouden.

Using ModSecurity to protect your endpoints in Kubernetes

What is ModSecurity? ModSecurity is an open-source, cross-platform web application firewall (WAF) engine that provides a robust security layer for your web applications. Initially developed for Apache, ModSecurity now supports IIS and Nginx, offering flexible and powerful protection against various web-based attacks. It acts as an intrusion detection and prevention engine, analyzing HTTP traffic and blocking malicious requests before they reach your application. Originally developed and sponsored by Trustwave, it has been transfered to the OWASP foundation earlier this year.

The Impact of Misconfigured Kubernetes Clusters on Business Continuity

Kubernetes has quickly become the industry standard for managing applications in the cloud. What was once seen as a complex technology is now part of the basics for companies looking to grow and scale their digital operations. These days, setting up a Kubernetes cluster is fairly straightforward, and many teams can get up and running in no time. However, just because it’s easy to set up doesn’t mean it’s always done right.

The Hidden Risks of Docker images: Unmaintained Software Components

As an early adopter of Docker, I’ve witnessed its amazing growth from the early days. I started with using Docker Swarm, and in 2018, I even wrote several blog posts on using Docker Swarm and how to use logspout to collect logs from Docker Swarm containers. In those posts, I explained how to deploy a global container on every node in a Swarm mode cluster to forward logs to a remote Logstash endpoint.