Container Security

The Implications of Kubernetes Vulnerability CVE-2018-1002105

By Fei Huang Kubernetes critical vulnerability CVE-2018-1002105 was reported this week and the implication is a big warning to the fast-growing, massive DevOps world. The wide adoption of Kubernetes and Docker workloads is no doubt indicative of a disruptive next generation platform technology. But of course, like the dark side of the moon, every big shiny thing… Read more »

Container Security

Critical Kubernetes & OpenShift Vulnerability Exposes API Server

The First Major Vulnerability Discovered in Kubernetes, And It’s A Big One The big news today on the eve of the start of DockerCon EMEA has not been conference related announcements but rather the disclosure of a critical security hole in Kubernetes, and by inheritance, Red Hat OpenShift. This vulnerability, CVE-2018-1002105, is so critical with… Read more »

Container Security

How to Automatically Scan Images Using OpenShift Image Streams

By Selvam Thangaraj The powerful capabilities enabled by OpenShift Image Streams is a welcome addition to the Red Hat OpenShift container platform. As more enterprises begin moving container workloads into production, the requirement to automate both the application management as well as the security tasks in their CI/CD pipeline becomes more critical. OpenShift Image Streams… Read more »

Container Security

Container Security Report by Gartner Highlights Maturing Options for Securing the CI/CD Pipeline

Gartner recently released a Technical Professional Advice report titled Container Security — From Image Analysis to Network Segmentation, Options Are Maturing* (by Joerg Fritsch, 28 August 2018, ID: G00366118), with what we believe is the most comprehensive overview of container security to date. In this report Mr. Fritsch identifies 11 threat vectors in an automated deployment… Read more »

Container Security

How to Hack a Kubernetes Container, Then Detect and Prevent It

By Dieter Reuter As we talked about before in this blog, containers are just vulnerable to be attacked as non-container workloads. Hackers can use many of their old tricks on new containers, such as application exploits, network attacks, or phishing scams. In this post and demo, I’ll show how to hack a Kubernetes container using… Read more »