Security Boost for Ingress-NGINX: How the New Version Protects Your Kubernetes Applications
The Ingress is one of the most frequently targeted components in Kubernetes. An Ingress typically …
A long-standing wish of the Kubernetes community has been to create a programmatic way to track security issues in Kubernetes (also known as “CVEs”). With the release of Kubernetes v1.25, we are pleased to announce the availability of such a feed as an alpha feature. In this blog post, we will explore the background and scope of this new service.
With the increasing focus on Kubernetes, the number of CVEs associated with Kubernetes has also risen. Although most CVEs that directly, indirectly, or transitively affect Kubernetes are regularly addressed, there is no single place where Kubernetes end users can programmatically subscribe to or retrieve data on resolved CVEs. The current options are either flawed or incomplete.
It creates a regularly and automatically updated, human- and machine-readable list of official Kubernetes CVEs.
A supporting contributor blog post has been published, detailing how this CVE feed was implemented to ensure the feed is adequately protected against tampering and automatically updated after a new CVE is announced.
To further develop this feature, SIG Security is collecting feedback from end users who use this alpha feed.
If you have feedback, please let us know by commenting on this tracking issue or informing us in the #sig-security-tooling Kubernetes Slack channel. (Sign up for Kubernetes Slack here)
A special thanks to Neha Lohia (@nehalohia27) and Tim Bannister (@sftim) for their outstanding collaboration over many months from “idea to implementation” of this feature.
Source: Kubernetes Blog
The Ingress is one of the most frequently targeted components in Kubernetes. An Ingress typically …
In a multi-region architecture, managing data is the ‘final boss’. While stateless …
In a multi-region architecture, we face a paradox: we want to isolate clusters as much as possible …