-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.xml
220 lines (172 loc) · 17.3 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Codelabs | Examples | Tutorials</title>
<link>https://codelab.alcide.io/</link>
<description>Recent content on Codelabs | Examples | Tutorials</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-us</language>
<lastBuildDate>Wed, 13 May 2020 05:00:00 +0530</lastBuildDate>
<atom:link href="https://codelab.alcide.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Alcide kAudit with EKS</title>
<link>https://codelab.alcide.io/codelab/kaudit-codelab-eks-onboarding/</link>
<pubDate>Wed, 13 May 2020 05:00:00 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/kaudit-codelab-eks-onboarding/</guid>
<description>Alcide kAudit is designed to automatically analyze Kubernetes audit logs to detect anomalous behavior of users and service accounts. kAudit automatically detects security-related issues related to Kubernetes&rsquo; administrative actions, especially anomalous behavior that can only be detected from observing extended context over multiple activities. In addition, kAudit supports Audit rules to detect violations of organization compliance policies regarding Kubernetes usage. Incident forensics, along with audit statistics, are presented in graphical and tabular summaries for easy investigation and analysis.</description>
</item>
<item>
<title>kAudit Use-Cases</title>
<link>https://codelab.alcide.io/codelab/kaudit-codelab-usecases/</link>
<pubDate>Thu, 02 Apr 2020 05:00:00 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/kaudit-codelab-usecases/</guid>
<description>Alcide kAudit is designed to automatically analyze Kubernetes audit logs to detect anomalous behavior of users and service accounts. kAudit automatically detects security-related issues related to Kubernetes&rsquo; administrative actions, especially anomalous behavior that can only be detected from observing extended context over multiple activities. In addition, kAudit supports Audit rules to detect violations of organization compliance policies regarding Kubernetes usage. Incident forensics, along with audit statistics, are presented in graphical and tabular summaries for easy investigation and analysis.</description>
</item>
<item>
<title>Process Whitelisting</title>
<link>https://codelab.alcide.io/archive/runtime-codelab-process-whitelisting/</link>
<pubDate>Sun, 29 Mar 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/archive/runtime-codelab-process-whitelisting/</guid>
<description>In this tutorial we will learn about Process Whitelisting. Process Whitelisting in Alcide Runtime Security (ART) monitors your Kubernetes clusters and autonomously detects and alerts about unauthorized processes running in your pods. Unauthorized processes are detected in real-time, allowing Security and DevOps teams to quickly respond and mitigate potential threats.
Note: Using Alcide Runtime Security requires to Sign up to Alcide Platform for a time limited trial.
Start Codelab</description>
</item>
<item>
<title>Process Whitelisting - hello world</title>
<link>https://codelab.alcide.io/codelab/runtime-codelab-process-whitelisting2/</link>
<pubDate>Sun, 29 Mar 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/runtime-codelab-process-whitelisting2/</guid>
<description>In this tutorial we will learn about Process Whitelisting, which is part of Alcide Runtime Security (ART). We will see an Hello World example which includes sign a process in Docker image, and then simulate an attack by running an unlisted process and change the whitelisted binary file.
Note: Using Alcide Runtime Security requires to Sign up to Alcide Platform for a time limited trial.
Start Codelab</description>
</item>
<item>
<title>GitHub Actions Integration</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-cicd-github-actions/</link>
<pubDate>Thu, 26 Mar 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-cicd-github-actions/</guid>
<description>In this tutorial we will learn how we can implement continuous security and cluster hygiene for Kubernetes applications in a Github Actions workflow.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Jenkins Integration</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-cicd-jenkins/</link>
<pubDate>Tue, 25 Feb 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-cicd-jenkins/</guid>
<description>In this tutorial we will learn how we can implement continuous security and cluster hygiene for Kubernetes applications in a Jenkins CI+CD pipeline.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Alcide Advisor Overview</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-overview/</link>
<pubDate>Mon, 20 Jan 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-overview/</guid>
<description>In this tutorial we will learn about Alcide Kubernetes Advisor, and how we can implement continuous security and cluster hygiene for one or more Kubernetes clusters.
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Prometheus + Grafana + Alcide Advisor</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-grafana-integration/</link>
<pubDate>Sun, 19 Jan 2020 10:00:00 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-grafana-integration/</guid>
<description>In this tutorial we will learn how to integrate Alcide Advisor with Prometheus and Grafana in order to gain security observability of your Kubernetes cluster hygiene and risk by expsoing Alcide Advisor&rsquo;s findings as security metrics.
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Threat Intelligence</title>
<link>https://codelab.alcide.io/codelab/runtime-codelab-threat-intelligence/</link>
<pubDate>Thu, 02 Jan 2020 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/runtime-codelab-threat-intelligence/</guid>
<description>In this tutorial we will learn about Alcide Threat Intelligence Engine. Alcide Threat Intelligence Engine is a module in Alcide Runtime Security (ART) that monitors your Kubernetes clusters&rsquo; and autonomously detects and alerts about suspicious communication in runtime, based on traffic to/from IP &amp; DNS with bad reputation. Alcide provides out-of-the-box Threat Detection engine equipped with canned analytics and alerts set. Alerts are detected in real-time, allowing Security and DevOps teams to quickly respond and mitigate potential threats.</description>
</item>
<item>
<title>Alcide Advisor Cron Job</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-cronjob/</link>
<pubDate>Wed, 01 Jan 2020 13:00:00 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-cronjob/</guid>
<description>In this tutorial we will deploy Alcide Advisor as an in-cluster cron job and export the report to a slack channel.
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Workload Segmentation</title>
<link>https://codelab.alcide.io/codelab/runtime-codelab-embedded-policies-star-demo/</link>
<pubDate>Fri, 01 Nov 2019 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/runtime-codelab-embedded-policies-star-demo/</guid>
<description>In this tutorial we will learn about Alcide Embedded Firewall Policies, which are part of Alcide Runtime Security (ART). We will see how Alcide Embedded Firewall Policies work in a real world scenario.
Note: Using Alcide Runtime Security requires to Sign up to Alcide Platform for a time limited trial.
Start Codelab
Star</description>
</item>
<item>
<title>Multi Cluster Scans (AKS)</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-aks/</link>
<pubDate>Sat, 26 Oct 2019 00:00:01 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-aks/</guid>
<description>In this codelab we will create a script that given an Azure subscription, we will scan the entire AKS clusters in the subscription, using Alcide Kubernetes Advisor. The scripting implemented in this codelab, can than be used to integrate into a nightly cron job in your pipeline.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Multi Cluster Scans (EKS)</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-eks/</link>
<pubDate>Sat, 26 Oct 2019 00:00:01 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-eks/</guid>
<description>In this codelab we will create a script that given a AWS Region, we will scan the entire EKS clusters in the region, using Alcide Kubernetes Advisor. The scripting implemented in this codelab, can than be used to integrate into a nightly cron job in your pipeline.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Multi Cluster Scans (GKE)</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-gke/</link>
<pubDate>Sat, 26 Oct 2019 00:00:01 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-multi-cluster-gke/</guid>
<description>In this codelab we will create a script that given a GCP Project, we will scan the entire GKE clusters in the project, using Alcide Kubernetes Advisor. The scripting implemented in this codelab, can than be used to integrate into a nightly cron job in your pipeline.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Cloud Firewall Policies</title>
<link>https://codelab.alcide.io/codelab/runtime-codelab-cloud-policies/</link>
<pubDate>Wed, 11 Sep 2019 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/runtime-codelab-cloud-policies/</guid>
<description>In this tutorial we will learn about Alcide Cloud Firewall Policies, which are part of Alcide Runtime Security (ART). We will see how Security and/or Opertion teams can create and manage firewall policy. The policies are effectively application aware Pod segmentation policies to support use cases that are not available as part of Kubernetes native network policies. For example, network policy that limit Pod access to cluster external database provided as a domain name, limit Pod access to 3rd party services such as Slack, address PCI DSS compliance needs, and more.</description>
</item>
<item>
<title>Microservice Firewall</title>
<link>https://codelab.alcide.io/codelab/runtime-codelab-embedded-policies/</link>
<pubDate>Wed, 11 Sep 2019 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/runtime-codelab-embedded-policies/</guid>
<description>In this tutorial we will learn about Alcide Embedded Firewall Policies, which are part of Alcide Runtime Security (ART). We will see how Developers and/or DevOps can implement firewall policy-as-code. The policies are effectively application aware Pod segmentation policies to support use cases that are not available as part of Kubernetes native network policies. For example, network policy that limit Pod access to cluster external database provided as a domain name, limit Pod access to 3rd party services such as Slack, address PCI DSS compliance needs, and more.</description>
</item>
<item>
<title>CircleCI Integration</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-cicd-circleci/</link>
<pubDate>Sun, 11 Aug 2019 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-cicd-circleci/</guid>
<description>In this tutorial we will learn how we can implement continuous security and cluster hygiene for Kubernetes applications in a CircleCI CI+CD pipeline.
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>Azure DevOps Pipelines Integration</title>
<link>https://codelab.alcide.io/codelab/advisor-codelab-cicd-azure-devops/</link>
<pubDate>Wed, 31 Jul 2019 10:51:47 +0530</pubDate>
<guid>https://codelab.alcide.io/codelab/advisor-codelab-cicd-azure-devops/</guid>
<description>In this tutorial we will learn about Alcide Kubernetes Advisor, and how we can implement continuous security and cluster hygiene for one or more Kubernetes clusters in a Azure DevOps pipeline.
Azure DevOps on Visual Studio Marketplace can be found here
Start Codelab
Note: this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.</description>
</item>
<item>
<title>About</title>
<link>https://codelab.alcide.io/pages/about/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>https://codelab.alcide.io/pages/about/</guid>
<description>Alcide Kubernetes Advisor In this freely-available edition of Alcide Kubernetes Advisor which scans Kubernetes cluster hygiene and security best practices. Alcide&rsquo;s commercial customers have access to additional scanning features, such as policy driven kubernetes scan, automatic updates, consuming reports from multiple clusters in a single dashboard, and enforcing policies using admission controller.
Claim your &lsquo;Free Forever&rsquo; Account
</description>
</item>
</channel>
</rss>