<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Life's like a box of chocolates 🍫 Your access shouldn't be. Register for our new webinar.

Search
Close icon
Search bar icon
blog /
MITRE ATT&CK Framework Containers Matrix for Kubernetes

MITRE ATT&CK Framework Containers Matrix for Kubernetes

If you’re Kuberntes admin and you’re not familiar with the tactics outlined in the MITRE ATT&CK framework, this blog post is for you. MITRE ATT&CK framework is an extensive knowledge base of tactics and techniques employed by bad actors that defensive security experts use to help defend their organizations against attack, and many times, used by their offensive security counterparts to test their weaknesses.
CIS Kubernetes Benchmark Implementation Recommendations

CIS Kubernetes Benchmark Implementation Recommendations

The CIS Kubernetes Benchmark is a set of prescriptive recommendations assembled to guide administrators to achieve good security hygiene and results in strength security outcomes for their Kubernetes environments.
Simplify Kubernetes Management on AWS

Simplify Kubernetes Management on AWS

Secure access controls must be applied universally and consistently across all your infrastructure—from the Linux boxes in your datacenter to your Kubernetes clusters in AWS. StrongDM Dynamic Access Management is uniquely positioned to provide seamless, secure access across your entire stack, simplifying access management and compliance for your legacy systems and modern cloud stack.
Supercharge Your SSH and Kubernetes Resources with Remote Identities

Supercharge Your SSH and Kubernetes Resources with Remote Identities

Learn how Remote Identities helps you leverage SSH and k8s capabilities to capitalize on infrastructure workflow investments you’ve already made.
Kubernetes in the Enterprise Webinar Recap

Kubernetes in the Enterprise Webinar Recap

Join strongDM CTO Justin McCarthy and a panel of experts as they discuss the challenges, complexities, and best practices of enterprise k8s adoption.
Kubernetes Governance Webinar Recap

Kubernetes Governance Webinar Recap

Is k8s governance a challenge for your team? Join strongDM’s CTO and a panel of experts to discover common pitfalls, plus tools + tricks to help manage them.
Survey Finds 5 DevOps Technologies That Are Hard to Manage

Survey Finds 5 DevOps Technologies That Are Hard to Manage

DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.
Kubernetes Access Doesn't Need to Be Complex

Kubernetes Access Doesn't Need to Be Complex

Provisioning and maintaining Kubernetes access doesn’t need to be a full-time job. Much of it can be automated with strongDM, resulting in more productive system administrators and users who can access the necessary clusters for their jobs much faster.
Kubernetes RBAC Explained: Challenges, Approaches, and More

Kubernetes RBAC Explained: Challenges, Approaches, and More

An explanation of role-based access control (RBAC) in Kubernetes, why it is hard to manage manually and practical strategies for simplifying RBAC in large-scale clusters.
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it doesn’t provide us with a single, built-in method for authenticating those accounts. Instead, we must choose from a variety of techniques involving third-party tools or resources to perform Kubernetes cluster authentication.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.