<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kube Cluster and Container security in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17732#M772</link>
    <description>I don't have an answer at this point, I start with CIS baselines as rule of thumb to cover hardening aspects.</description>
    <pubDate>Tue, 08 Jan 2019 20:35:35 GMT</pubDate>
    <dc:creator>Kempy</dc:creator>
    <dc:date>2019-01-08T20:35:35Z</dc:date>
    <item>
      <title>Kube Cluster and Container security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16866#M692</link>
      <description>&lt;P&gt;How are folk&amp;nbsp;auditing and securing kubernetes clusters and containers in general??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have struggled to get kube-bench to run in fully containerized control planes such as rancher and openshift.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 15:24:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16866#M692</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-12-05T15:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Kube Cluster and Container security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16911#M695</link>
      <description>Wow that's a lot of people not using docker and kubernetes or using them out of the box with defaults.</description>
      <pubDate>Fri, 07 Dec 2018 15:00:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16911#M695</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-12-07T15:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Kube Cluster and Container security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17708#M769</link>
      <description>&lt;P&gt;As with the growth of the use of docker/containers this sounds to me as an interesting topic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we come up with an suggested audit procedure?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 08:43:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17708#M769</guid>
      <dc:creator>leersums</dc:creator>
      <dc:date>2019-01-08T08:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Kube Cluster and Container security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17732#M772</link>
      <description>I don't have an answer at this point, I start with CIS baselines as rule of thumb to cover hardening aspects.</description>
      <pubDate>Tue, 08 Jan 2019 20:35:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17732#M772</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2019-01-08T20:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Kube Cluster and Container security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17885#M800</link>
      <description>&lt;P&gt;Hunting around:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://kubernetes.io/docs/tasks/debug-application-cluster/audit/" target="_blank"&gt;https://kubernetes.io/docs/tasks/debug-application-cluster/audit/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://kubernetes.io/docs/reference/command-line-tools-reference/kube-apiserver/" target="_blank"&gt;https://kubernetes.io/docs/reference/command-line-tools-reference/kube-apiserver/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://kubernetes.io/docs/concepts/policy/pod-security-policy/" target="_blank"&gt;https://kubernetes.io/docs/concepts/policy/pod-security-policy/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree, understand the technology, the Pod Security; Container security and then Kubernetes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This looks like fun.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Jan 2019 19:12:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/17885#M800</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-13T19:12:30Z</dc:date>
    </item>
  </channel>
</rss>

