Topic Hub

Cloud Native Security

Hardening containers, Kubernetes, and the supply chain.

Network policies, Falco runtime detection, Kyverno admission, SLSA supply-chain, Cilium, and the security primitives behind safe production clusters.

Start here

More on Cloud Native Security

Cover for Day 7: Ship It - and What Comes Next
dockersecurityMay 4, 2026

Day 7: Ship It - and What Comes Next

Your container runs as root and has 18 CVEs. A Docker Captain's guide to hardening, Scout policies, DHI, Sandboxes, and what comes after Docker.

Saloni NarangSaloni Narang · 13 min
Read →
Cover for What is Reproducibility and why does it matter?
securityvulnerabilityAug 26, 2024

What is Reproducibility and why does it matter?

In this blog, we'll explore how reproducible builds plays a significant role in securing the software supply chain.

Kunal VermaKunal Verma · 9 min
Read →
Cover for Building a Zero CVE Strategy
securitynixJul 12, 2024

Building a Zero CVE Strategy

In this blog, we will delve into the primary causes of CVE fatigue and discuss some actionable strategies to minimize CVE fatigue.

Kunal VermaKunal Verma · 8 min
Read →
Cover for Supply Chain Security Using SLSA - Part 2 (The Framework)
frameworksecurityJun 13, 2024

Supply Chain Security Using SLSA - Part 2 (The Framework)

In this article we'll discuss the Supply Chain Levels for Software Artifacts (SLSA) framework to achieve supply chain security in an organization.

Kunal VermaKunal Verma · 9 min
Read →
Cover for Announcing BuildSafe: Your Path to Secure Software Supply Chain
securitycveJun 10, 2024

Announcing BuildSafe: Your Path to Secure Software Supply Chain

This post introduces BuildSafe that lets you build your application using nix with ease. It also helps you in securing your software supply chain.

Saiyam PathakSaiyam Pathak · 3 min
Read →
Cover for The Ultimate Guide to Audit Logging in Kubernetes: From Setup to Analysis
securitykubernetesMay 15, 2023

The Ultimate Guide to Audit Logging in Kubernetes: From Setup to Analysis

Audit logging in Kubernetes and jq

SantoshdtsSantoshdts · 10 min
Read →
Cover for How get started with Hashicorp Vault🛡️
awssecurityApr 5, 2023

How get started with Hashicorp Vault🛡️

it provides how to setup vault, how to configure backend with S3 and more and finally how to make auto-seal work and HTTPS with self signed certificate

Dipankar DasDipankar Das · 9 min
Read →
Cover for DIY: How To Build A Kubernetes Policy Engine
godevelopmentJul 28, 2022

DIY: How To Build A Kubernetes Policy Engine

As usual, here is the link to the code! %[https://github.com/dirien/kubernetes-diy-policy-engine] In this blog post, we want to use one of the biggest…

Engin DiriEngin Diri · 14 min
Read →
Cover for Installing Prometheus with SELinux
linuxsecurityMay 16, 2022

Installing Prometheus with SELinux

Shows how to use SELinux to install Applications

LeonLeon · 3 min
Read →
Cover for Certified Kubernetes Security Specialist (CKS) 2022 exam guide
securitykubernetesApr 20, 2022

Certified Kubernetes Security Specialist (CKS) 2022 exam guide

Distributed systems comes with a lot of benefits but there are some downsides as well. One of the main downside of distributed system is security. No. of at

Aditya TripathiAditya Tripathi · 13 min
Read →