Containers/K8s

Explore how teams secure containerized applications and Kubernetes environments. These articles explain architectural risks, runtime threats, and the controls teams apply from build to prod.

Kubernetes engineer job description

Equipo de expertos de Wiz

A Kubernetes engineer is a specialized tech role responsible for the design, deployment, and maintenance of container orchestration platforms.

What is Azure container security scanning?

Equipo de expertos de Wiz

Azure Container Security Scanning finds vulnerabilities and misconfigurations in container images and workloads in Azure Container Registry and AKS.

What is AWS container scanning?

Equipo de expertos de Wiz

AWS container scanning is the practice of identifying security issues in your software containers before they run in production.

What is Docker vulnerability scanning?

Equipo de expertos de Wiz

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

What is container image scanning?

Equipo de expertos de Wiz

Container image scanning is the automated process of analyzing container images for security vulnerabilities, misconfigurations, and compliance violations.

Container runtime scanning best practices

Equipo de expertos de Wiz

Runtime scanning answers a critical question: 'What is runtime security for containers?' It focuses on detecting live behaviors, active threats, and anomalies that only appear when containers execute under real production traffic.

What is a YAML File in Kubernetes?

Equipo de expertos de Wiz

Kubernetes YAML is the declarative file format Kubernetes uses to define, configure, and manage cluster resources.

Using eBPF in Kubernetes: A security overview

Equipo de expertos de Wiz

eBPF provides deep visibility into network traffic and application performance while maintaining safety and efficiency by executing custom code in response to the kernel at runtime.

Container Scanning Tools

Looking to make the most of containerization while minimizing risk? Container scanning solutions are a critical line of defense that help ensure the safe and secure deployment of applications.

The top 11 open-source Kubernetes security tools

It’s a good idea to consider a range of Kubernetes security tools. Open source solutions can greatly improve the security of your Kubernetes clusters, so this section explores the top 11 open-source Kubernetes security tools that can help to safeguard your Kubernetes environment.

Kubernetes cost management strategies

Equipo de expertos de Wiz

Understand the total cost of running Kubernetes: control plane, nodes, add‑ons, and time spent by engineers/operators.

Kubernetes incident response: A security playbook

Equipo de expertos de Wiz

Kubernetes security incidents differ fundamentally from traditional IT breaches. Containers and pods are ephemeral—some containers live for only seconds or minutes. They're created, destroyed, and moved within seconds, making it far harder to track attacks compared to static servers.

Kubernetes Nodes vs Pods: Key Differences Explained

Equipo de expertos de Wiz

Nodes are the physical or virtual machines that provide computing resources in a Kubernetes cluster, while pods are the smallest deployable units that contain one or more containers

Kubernetes control plane: What it is and how to secure it

Equipo de expertos de Wiz

The Kubernetes control plane is the cluster’s management layer that exposes the API, stores cluster state, and continuously reconciles desired configuration—scheduling, scaling, and replacing pods as needed—to keep applications healthy and consistent across nodes.

Kubernetes Namespaces: Security Best Practices

Kubernetes namespaces divide a given cluster into virtual clusters, helping to separate and manage resources while still keeping them within the same physical cluster. By segregating workloads and applying policies per namespace, you can create boundaries that keep your multi-tenant environments safe and organized.

Container Vulnerability Management

Equipo de expertos de Wiz

Container vulnerability management is the process of finding and fixing flaws throughout the container stack.

Kubernetes DevSecOps

Equipo de expertos de Wiz

In this blog post, we’ll discuss the need for DevSecOps in Kubernetes environments. We'll walk through the reasons behind this approach, the unique challenges of orchestrated platforms, and the Kubernetes security layers that matter most.

What is a Container Engine?

A container engine is a software tool that automates the process of running applications in isolated, lightweight environments called containers.

Container Runtime Security

Container runtime security is the combination of measures and technology implemented to protect containerized applications at the runtime stage.

Kubernetes as a service

Kubernetes as a service (KaaS) is a model in which hyperscalers like AWS, GCP, and Azure allow you to quickly and easily start a Kubernetes cluster and begin deploying workloads on it instantly.

Kubernetes Vulnerability Scanning

Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.

What is KSPM?

Kubernetes Security Posture Management (KSPM) is the practice of monitoring, assessing, and ensuring the security and compliance of Kubernetes environments.

Container Image Signing

Container image signing is a critical security process for establishing trust. Just as you'd expect a signature to verify the authenticity of a document, image signing does the same for container images—those neat packages that carry your code along with all the necessary parts to run it anywhere.