Security

Andy Clemenko
Andy Clemenko
Gray Calendar Icon October 20, 2020
A Gray Icon of a Clock with White Clock Hands Read time: 7 min

We all know how complicated it is to set up Kubernetes, and customers love Rancher because it simplifies that rollout. But once you get the cluster running, a more significant challenge awaits: how do you ensure your Kubernetes applications are up to date and secure? By combining Rancher and StackRox, you can simplify both the management and security of your Kubernetes deployments.

Eamon Bauman
Eamon Bauman
Gray Calendar Icon February 11, 2020
A Gray Icon of a Clock with White Clock Hands Read time: 7 min

Transport Layer Security is used to secure network communication. Find about why TLS is important and how to effectively use it for Rancher and Kubernetes management.

Eamon Bauman
Eamon Bauman
Gray Calendar Icon February 4, 2020
A Gray Icon of a Clock with White Clock Hands Read time: 6 min

Transport Layer Security is used to secure network communication. Find about why TLS is important and how to effectively use it for Rancher and Kubernetes management.

Bill Maxwell
Bill Maxwell
Gray Calendar Icon December 19, 2019
A Gray Icon of a Clock with White Clock Hands Read time: 3 min

It’s that time of year again, the time for retrospective articles and “Top 10 of the Year” posts. We decided to focus our recap on how CVEs and changes in the threat landscape affected Kubernetes in 2019, and what changes that brought about inside of Rancher.

Rutrell Yasin
Rutrell Yasin
Gray Calendar Icon February 27, 2019
A Gray Icon of a Clock with White Clock Hands Read time: 6 min

This article covers Kubernetes security solutions that have an eye toward keeping clusters safe from unauthorized inside access. Second in a series of articles on Kubernetes security. Read more here.

Gray Calendar Icon December 4, 2018
A Gray Icon of a Clock with White Clock Hands Read time: 7 min

Darren Shepherd, Rancher co-founder and Chief Architect, describes the Kubernetes critical CVE issue he discovered, how it came to a resolution, and what it says about the Kubernetes open-source community.

Gray Calendar Icon July 17, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 4 min

In the world of containers, Kubernetes has become the community standard for container orchestration and management. But there are some basic elements surrounding networking that need to be considered as applications are built to ensure that full multi-cloud capabilities can be leveraged. The Basics of Kubernetes Networking: Pods The basic unit of management inside Kubernetes is not a container—It is called a pod. A pod is simply one or more containers that are deployed as a unit.

Gray Calendar Icon June 12, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 4 min

Each time a new software technology arrives on the scene, InfoSec teams can get a little anxious. And why shouldn’t they? Their job is to assess and mitigate risk – and new software introduces unknown variables that equate to additional risk for the enterprise. It’s a tough job to make judgments about new, evolving, and complex technologies; that these teams approach unknown, new technologies with skepticism should be appreciated. This article is an appeal to the InfoSec people of the world to be optimistic when it comes to containers, as containers come with some inherent security advantages: Immutability In a typical production environment, you have a number of things managing state on your servers.

Gray Calendar Icon March 29, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 6 min

Your storage system should be locked down with all security and access control tools available to you as well. That is true whether the storage serves containers or any other type of application environment. How do you secure containers? That may sound like a simple question, but it actually has a six- or seven-part answer. That’s because securing containers doesn’t involve just deploying one tool or paying careful attention to one area where vulnerabilities can exist.

Gray Calendar Icon March 21, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 2 min

DevOps can now efficiently and securely deploy containers for enterprise applications As more enterprises move to a container-based application deployment model, DevOps teams are discovering the need for management and orchestration tools to automate container deployments. At the same time, production deployments of containers for business critical applications require specialized container-intelligent security tools. To address this, Rancher Labs and NeuVector today announced that they have partnered to make container security as easy to deploy as application containers.

Gray Calendar Icon March 9, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 4 min

MongoDB, the popular open source NoSQL database, has been in the news a lot recently—and not for reasons that are good for MongoDB admins. Early this year, reports began appearing of MongoDB databases being “taken hostage” by attackers who delete all of the data stored inside the databases, then demand ransoms to restore it. Security is always important, no matter which type of database you’re using. But the recent spate of MongoDB attacks makes it especially crucial to secure any MongoDB databases that you may use as part of your container stack.

Gray Calendar Icon January 26, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 6 min

As one of the most disruptive technologies in recent years, container-based applications are rapidly gaining traction as a platform on which to launch applications. But as with any new technology, the security of containers in all stages of the software lifecycle must be our highest priority. This post seeks to identify some of the inherent security challenges you’ll encounter with a container environment, and suggests base elements for a docker security plan to mitigate those vulnerabilities.

Get started with Rancher