Guides

Search Results 11 - 20 of 20

Guide

Securing Kubernetes Checklist

Kubernetes has become the de facto operating system of the cloud. Fifty-four percent of containers live for five minutes or less1, which makes investigating anomalous behavior and breaches extremely challenging. This checklist to provide guidance on choosing your approach to security as you ramp up the use of containers and Kubernetes.

Guide

30-60-90 Day Checklist for DevOps Engineer

Your team is responsible for ensuring faster application delivery. You’re probably starting to adopt opensource tools that support the “shift left” in security best practices, as well as evaluating containerized and serverless architectures to deliver applications. This guide will provide a well-defined framework to successfully onboard and make a new DevOps/DevSecOps engineer productive within the first 90 days.

Guide

Prometheus Monitoring Guide

Prometheus is fast becoming one of the most popular Docker and Kubernetes monitoring tools to use. Learn about the benefits of Prometheus, and how to use it for monitoring Kubernetes services, clusters and components.

Guide

Microservices and container security tool checklist

Like every major platform shift, the move to containers and microservices triggers the need to rethink the tooling required to secure your infrastructure effectively. In this scorecard we’ll cover the key areas you need to think about to support your microservice infrastructure and secure your dynamic technical and business requirements. Click to learn more.

Guide

Scaling and Augmenting Prometheus

Common challenges that organizations face with Prometheus once they are in production involve scalability, high availability, long-term storage, and day two operational drawbacks. In the last few months, several solutions have been made available. We will discuss which approaches can be taken to run Prometheus at scale.

Guide

NIST 800-190 Application Security Guide Checklist

Read the NIST Application Security Guide where we show you how to go a step beyond the recommendations from the NIST SP 800-190 application container security publication. This is a checklist of the practical steps and controls you can take to comply with NIST recommendations using Sysdig.

Guide

Monitoring & Management of Docker & Containers

With the introduction of containers and microservices, monitoring solutions have to handle more ephemeral services and server instances than ever before. Monitoring containerized applications and environments has also moved beyond just the operations team, or at the very least has opened up to more roles, as the DevOps movement encourages cross-team accountability. Click to learn more.

Guide

The Docker monitoring tool checklist

We’ll cover the key areas you need to think about to support your microservice infrastructure and secure your dynamic technical and business requirements. Click to learn more.

Guide

20 Docker Security Tools Compared

There is much more than image vulnerability scanning and these are 20 container and Docker specific security tools that can help. Click to learn more.

Guide

For Dummies: Running Containers in Production

Running Containers in Production For Dummies, Sysdig Special Edition, explores the benefits of containers and the challenges of deploying containerized applications in production. It provides an overview of the container ecosystem as well as the development processes and architectures that complement it. Click to learn more.