Sysdig Site Search
SOC 2 compliance for containers and Kubernetes security
This article contains useful tips to implement SOC 2 compliance for containers and Kubernetes. The Service Organization Controls (SOC) reports...
Ceph persistent volume for Kubernetes or OpenShift
State aware applications like databases or file repositories need access to the same file system no matter where the container they are running on is scheduled. Kubernetes and Openshift call this persistent volume.
Kubernetes defined monitoring
Sysdig recently launched Teams, a way to create service-based access control across your monitoring environment. The idea was simple and...
Sysdig Introduces Cost Advisor to Cut Kubernetes Costs by 40%
With cloud costs spiraling out of control, Sysdig can save organizations thousands of dollars SAN FRANCISCO (Oct. 19, 2022) –...
Shielding your Kubernetes runtime with image scanning on admission controller
Implementing image scanning on a Kubernetes admission controller is an interesting strategy to apply policies that need Kubernetes context, and...
Sysdig Cuts Container and Kubernetes Visibility and Security Onboarding to 5 Minutes.
Out-of-the-box dashboards and integrations with the only SaaS-first solution for Secure DevOps, allow cloud teams to get started quickly with...
Runtime security in Azure Kubernetes Service (AKS)
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Sysdig cuts onboarding for container and Kubernetes visibility and security to 5 minutes
Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new...
NIST 800-53 compliance for containers and Kubernetes
In this blog, we will cover the various requirements you need to meet to achieve NIST 800-53 compliance, as well...