<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
15 Kubernetes Security Best Practices in 2024

15 Kubernetes Security Best Practices in 2024

Kubernetes (K8S) has revolutionized software development, but managing such a complex system with numerous components can be challenging. Fortunately, there are several best practices your team can adopt to secure your K8S environment and reduce your attack surface. By implementing these Kubernetes ...
Kubectl Cheat Sheet - Kubernetes Commands (Basic to Advanced)

Kubectl Cheat Sheet - Kubernetes Commands (Basic to Advanced)

Kubernetes is a popular tool for managing synchronized groups, or clusters, of computers. Users employ it to configure and deploy applications in parallel across clusters on your networks. The kubectl command line tool in Kubernetes lets you send instructions to and receive information from your clusters. This kubectl cheat sheet is a quick guide to getting started with kubectl, including installation, configuration, key commands, and efficiency tips.
How to Restart Kubernetes Pods with Kubectl: 5 Methods

How to Restart Kubernetes Pods with Kubectl: 5 Methods

Kubernetes pod restarts are important for efficiently managing containerized applications in a dynamic microservices architecture. Understanding how to effectively restart pods using kubectl will help you streamline operations and minimize downtime. This article describes five methods to restart Kubernetes pods empowering you to maintain application health and performance confidently.
MITRE ATT&CK Framework Containers Matrix for Kubernetes

MITRE ATT&CK Framework Containers Matrix for Kubernetes

If you’re Kuberntes admin and you’re not familiar with the tactics outlined in the MITRE ATT&CK framework, this blog post is for you. MITRE ATT&CK framework is an extensive knowledge base of tactics and techniques employed by bad actors that defensive security experts use to help defend their organizations against attack, and many times, used by their offensive security counterparts to test their weaknesses.
CIS Kubernetes Benchmark Implementation Recommendations

CIS Kubernetes Benchmark Implementation Recommendations

The CIS Kubernetes Benchmark is a set of prescriptive recommendations assembled to guide administrators to achieve good security hygiene and results in strength security outcomes for their Kubernetes environments.
Simplify Kubernetes Management on AWS

Simplify Kubernetes Management on AWS

Secure access controls must be applied universally and consistently across all your infrastructure—from the Linux boxes in your datacenter to your Kubernetes clusters in AWS. StrongDM Dynamic Access Management is uniquely positioned to provide seamless, secure access across your entire stack, simplifying access management and compliance for your legacy systems and modern cloud stack.
Supercharge Your SSH and Kubernetes Resources with Remote Identities

Supercharge Your SSH and Kubernetes Resources with Remote Identities

Learn how Remote Identities helps you leverage SSH and k8s capabilities to capitalize on infrastructure workflow investments you’ve already made.
Kubernetes in the Enterprise Webinar Recap

Kubernetes in the Enterprise Webinar Recap

Join strongDM CTO Justin McCarthy and a panel of experts as they discuss the challenges, complexities, and best practices of enterprise k8s adoption.
Kubernetes Governance Webinar Recap

Kubernetes Governance Webinar Recap

Is k8s governance a challenge for your team? Join strongDM’s CTO and a panel of experts to discover common pitfalls, plus tools + tricks to help manage them.
Survey Finds 5 DevOps Technologies That Are Hard to Manage

Survey Finds 5 DevOps Technologies That Are Hard to Manage

DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.
Kubernetes Access Doesn't Need to Be Complex

Kubernetes Access Doesn't Need to Be Complex

Provisioning and maintaining Kubernetes access doesn’t need to be a full-time job. Much of it can be automated with strongDM, resulting in more productive system administrators and users who can access the necessary clusters for their jobs much faster.
Kubernetes RBAC Explained: Challenges, Approaches, and More

Kubernetes RBAC Explained: Challenges, Approaches, and More

An explanation of role-based access control (RBAC) in Kubernetes, why it is hard to manage manually and practical strategies for simplifying RBAC in large-scale clusters.
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it doesn’t provide us with a single, built-in method for authenticating those accounts. Instead, we must choose from a variety of techniques involving third-party tools or resources to perform Kubernetes cluster authentication.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀