Guides

Search Results 11 - 20 of 24

Guide

Security on Red Hat OpenShift

In this definitive guide to securing cloud applications on Red Hat OpenShift, we will learn how to address the challenges like implementing security and vulnerability management, compliance and audit, threat prevention, incident response and digital forensics on containers within OpenShift. Download the guide to learn best practices of implementing application security on OpenShift.

Guide

Continuous Security for AWS Cloud and Containers

This guide offers a framework for establishing comprehensive cloud and container security for AWS environments with specific recommendations for how Sysdig can complement and enhance native AWS tools.

Guide

Business Value Framework

This business value framework provides specific customer examples of business impact created by onboarding secure DevOps. It will also guide you to estimate the Return on Investment (ROI) for your organization. Click to learn more.

Guide

Kubernetes Monitoring Checklist

You are adopting a DevOps approach, using Kubernetes and containers to accelerate innovation. Kubernetes and container monitoring is critical to managing application performance, service uptime and troubleshooting. Click to learn more.

Guide

Securing Kubernetes Checklist

Kubernetes has become the de facto operating system of the cloud. Fifty-four percent of containers live for five minutes or less1, which makes investigating anomalous behavior and breaches extremely challenging. This checklist to provide guidance on choosing your approach to security as you ramp up the use of containers and Kubernetes.

Guide

30-60-90 Day Checklist for DevOps Engineer

Your team is responsible for ensuring faster application delivery. You’re probably starting to adopt opensource tools that support the “shift left” in security best practices, as well as evaluating containerized and serverless architectures to deliver applications. This guide will provide a well-defined framework to successfully onboard and make a new DevOps/DevSecOps engineer productive within the first 90 days.

Guide

Prometheus Monitoring Guide

Prometheus is fast becoming one of the most popular Docker and Kubernetes monitoring tools to use. Learn about the benefits of Prometheus, and how to use it for monitoring Kubernetes services, clusters and components.

Guide

Microservices and container security tool checklist

Like every major platform shift, the move to containers and microservices triggers the need to rethink the tooling required to secure your infrastructure effectively. In this scorecard we’ll cover the key areas you need to think about to support your microservice infrastructure and secure your dynamic technical and business requirements. Click to learn more.

Guide

Scaling and Augmenting Prometheus

Common challenges that organizations face with Prometheus once they are in production involve scalability, high availability, long-term storage, and day two operational drawbacks. In the last few months, several solutions have been made available. We will discuss which approaches can be taken to run Prometheus at scale.

Guide

NIST 800-190 Application Security Guide Checklist

Read the NIST Application Security Guide where we show you how to go a step beyond the recommendations from the NIST SP 800-190 application container security publication. This is a checklist of the practical steps and controls you can take to comply with NIST recommendations using Sysdig.