Published on 00/00/0000
Last updated on 00/00/0000
Published on 00/00/0000
Last updated on 00/00/0000
Share
Share
2 min read
Share
Below are a few highlights of the Banzai Cloud Pipeline security approach: All secrets, certificates are stored and generated by Vault Secrets are dynamically injected in Pods Pipeline and PKE is integrated with Dex to support multiple auth backends Provider agnostic authentication and authorization for Pipeline and PKEObviously there are lots more, if you are interested to learn more please get in touch with us, we'd be happy to chat. The Banzai Cloud PKE CIS Benchmark for Kubernetes test results are available here.
kube-bench
is a Go application that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark. The tool is now wired into our own internal release process and running continuously against PKE clusters.
kube-hunter
as well, in both remote/internal scanning and also in active hunting mode, in order to attempt to exploit vulnerabilities that the tool finds. We are happy to disclose that there were no vulnerabilities found and also that we are using the tool in the Pipeline Kubernetes Engine release process.Get emerging insights on innovative technology straight to your inbox.
Discover why security teams rely on Panoptica's graph-based technology to navigate and prioritize risks across multi-cloud landscapes, enhancing accuracy and resilience in safeguarding diverse ecosystems.
The Shift is Outshift’s exclusive newsletter.
The latest news and updates on cloud native modern applications, application security, generative AI, quantum computing, and other groundbreaking innovations shaping the future of technology.