NSA Guidance

NSA Security Best Practices for Kubernetes

In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...
Kubernetes

NSA Wants Strong Kubernetes Authentication and Authorization 

When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person ...
NSA Guidance

The NSA Wants the Network Locked Down

The NSA’s Kubernetes Hardening Guide offers a lot of advice on implementing the best defense-in-depth approach to your workloads. Part of that guide outlines how Kubernetes users can secure and harden the ...
NSA Guidance

NSA’s Kubernetes Hardening Guidelines and Pod Security

I previously asked (and answered) the question, What Are the NSA K8s Guidelines and Why Should You Care? I suggested that the first step to compliance is to understand your Kubernetes environment ...
compliance NSA Kubernetes stateful kubernetes k8s Kublr

What Are the NSA K8s Guidelines and Why Should You Care?

The NSA released its Kubernetes Hardening Guidelines almost a year ago and made updates to it this March. The purpose of the document is to provide an overview of what Kubernetes users ...