Containers/K8s

Explore how teams secure containerized applications and Kubernetes environments. These articles explain architectural risks, runtime threats, and the controls teams apply from build to prod.

Kubernetes engineer job description

Team di esperti Wiz

A Kubernetes engineer is a specialized tech role responsible for the design, deployment, and maintenance of container orchestration platforms.

What is Azure container security scanning?

Team di esperti Wiz

Azure Container Security Scanning finds vulnerabilities and misconfigurations in container images and workloads in Azure Container Registry and AKS.

What is AWS container scanning?

Team di esperti Wiz

AWS container scanning is the practice of identifying security issues in your software containers before they run in production.

What is Docker vulnerability scanning?

Team di esperti Wiz

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

What is container image scanning?

Team di esperti Wiz

Container image scanning is the automated process of analyzing container images for security vulnerabilities, misconfigurations, and compliance violations.

Container runtime scanning best practices

Team di esperti Wiz

Runtime scanning answers a critical question: 'What is runtime security for containers?' It focuses on detecting live behaviors, active threats, and anomalies that only appear when containers execute under real production traffic.

What is a YAML File in Kubernetes?

Team di esperti Wiz

Kubernetes YAML is the declarative file format Kubernetes uses to define, configure, and manage cluster resources.

Using eBPF in Kubernetes: A security overview

Team di esperti Wiz

eBPF provides deep visibility into network traffic and application performance while maintaining safety and efficiency by executing custom code in response to the kernel at runtime.

Container Scanning Tools

Looking to make the most of containerization while minimizing risk? Container scanning solutions are a critical line of defense that help ensure the safe and secure deployment of applications.

The top 11 open-source Kubernetes security tools

It’s a good idea to consider a range of Kubernetes security tools. Open source solutions can greatly improve the security of your Kubernetes clusters, so this section explores the top 11 open-source Kubernetes security tools that can help to safeguard your Kubernetes environment.

Kubernetes cost management strategies

Team di esperti Wiz

Understand the total cost of running Kubernetes: control plane, nodes, add‑ons, and time spent by engineers/operators.

Kubernetes incident response: A security playbook

Team di esperti Wiz

Kubernetes security incidents differ fundamentally from traditional IT breaches. Containers and pods are ephemeral—some containers live for only seconds or minutes. They're created, destroyed, and moved within seconds, making it far harder to track attacks compared to static servers.

Kubernetes Nodes vs Pods: Key Differences Explained

Team di esperti Wiz

Nodes are the physical or virtual machines that provide computing resources in a Kubernetes cluster, while pods are the smallest deployable units that contain one or more containers

Kubernetes control plane: What it is and how to secure it

Team di esperti Wiz

The Kubernetes control plane is the cluster’s management layer that exposes the API, stores cluster state, and continuously reconciles desired configuration—scheduling, scaling, and replacing pods as needed—to keep applications healthy and consistent across nodes.

Kubernetes Namespaces: Security Best Practices

Kubernetes namespaces divide a given cluster into virtual clusters, helping to separate and manage resources while still keeping them within the same physical cluster. By segregating workloads and applying policies per namespace, you can create boundaries that keep your multi-tenant environments safe and organized.

Container Vulnerability Management

Team di esperti Wiz

Container vulnerability management is the process of finding and fixing flaws throughout the container stack.

Kubernetes DevSecOps

Team di esperti Wiz

In this blog post, we’ll discuss the need for DevSecOps in Kubernetes environments. We'll walk through the reasons behind this approach, the unique challenges of orchestrated platforms, and the Kubernetes security layers that matter most.

Kubernetes as a service

Kubernetes as a service (KaaS) is a model in which hyperscalers like AWS, GCP, and Azure allow you to quickly and easily start a Kubernetes cluster and begin deploying workloads on it instantly.

Kubernetes Vulnerability Scanning

Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.

What is KSPM?

Kubernetes Security Posture Management (KSPM) is the practice of monitoring, assessing, and ensuring the security and compliance of Kubernetes environments.

Container Image Signing

Container image signing is a critical security process for establishing trust. Just as you'd expect a signature to verify the authenticity of a document, image signing does the same for container images—those neat packages that carry your code along with all the necessary parts to run it anywhere.