Avatar photo
By: Glen Kosaka

August 21, 2020 12:44 pm

2,092 views

Protect Kubernetes Containers on AWS Using the Shared Responsibility Model

Editor's note: This post was updated on August 17, 2022 Deploying an AWS container security solution is a critical requirement to protect your data and assets running on AWS, including EC2, EKS, ECS, Kubernetes, or RedHat OpenShift. In its ‘Shared Responsibility Model,’ AWS states that the security responsibility is shared between AWS and […]

Read More


Avatar photo
By: Fei Huang

June 4, 2020 12:11 pm

1,676 views

How to Protect Secrets in Containers Using DPI and DLP

Every cloud application and service utilizes a key (secret) to identify and authorize communications. Secrets are also used to authorize access to containerized applications which require a login. These credentials are widely used by public facing services as well as internal and external REST API’s everywhere. Examples include the AWS IAM access key, Google […]

Read More


Avatar photo
By: Glen Kosaka

March 26, 2020 12:23 pm

1,779 views

End-to-End Vulnerability Management for Images, Containers and Kubernetes

NeuVector 3.2 Release Adds a Vulnerability & Compliance ‘Explorer,’ High Performance Scanner, and Host Process Protection   The ‘Shift-Left’ movement to build security into the CI/CD pipeline continues to grow. Vulnerability management is a critical component of this, and organizations must ‘Shift-Left, then Shift-Right‘ in order to fully […]

Read More


Avatar photo
By: Glen Kosaka

November 6, 2019 12:30 pm

2,698 views

How to Create ‘Security Policy as Code’ to Automate Application Security Policies in the CI/CD Pipeline

DevOps and DevSecOps teams can now automatically deploy and update new applications securely using Kubernetes Custom Resource Definition (CRDs)   As DevOps teams integrate their toolchain to enable automated deployment of container-based applications, one aspect has always slowed down a modern cloud-native pipeline: security. And while automated vulnerability scanning is now standard practice, creating […]

Read More


Avatar photo
By: Glen Kosaka

August 1, 2019 12:38 pm

1,994 views

Container Security Monitoring with Prometheus and Grafana

Today, millions of applications are running in containers, with many millions more going into production.  It is not easy to manage and monitor a massive number of containers in any deployment at the same time. In order to better visualize and track container status, the combination of Prometheus and Grafana provides a simple, easy-to-deploy […]

Read More