Guides for cybersecurity
Automating Container Image Signing with Cosign and Github Actions
Learn more about supply chain attacks, using the Sigstore project and Cosign for signing container images, and integrating them with GitHub actions.
Rate-limiting applications with Nginx Ingress
Learn how to implement rate-limiting using the NGINX Ingress controller in a Kubernetes environment. This tutorial covers the benefits of rate-limiting and a step-by-step guide on setting up rate-limiting.
Validating K8s configuration files to prevent misconfiguration
Delve into the significance of validating Kubernetes configuration files to avoid common pitfalls and explore our practical demonstration of how to do all this using Civo's managed Kubernetes service.
How to enforce Kubernetes best practices using ValidKube and Kubescape
Learn how to audit your manifest files and scan clusters to ensure you're following best practice
How to mitigate Kubernetes runtime security threats
Learn how to secure your Kubernetes cluster and protect your applications from runtime security threats, including analyzing vulnerabilities, detecting breaches, and implementing preventive measures.
Mastering Modern Backup with Kasten K10 for Kubernetes
Discover the power of Kasten K10, the Kubernetes backup solution by Veeam, and learn how to set it up on Kubernetes. Step-by-step guide for easy deployment and recovery.
Securing a K3s cluster with Falco
This guide provides instructions to secure a K3s cluster using Falco, an open-source cloud-native runtime security project.
Ensuring YAML best practices using KubeLinter
When we declare various Kubernetes objects in YAML, can we have YAML checked prior to the deployment of applications or even Helm charts? The answer is yes - with a tool like KubeLinter
Using Checkov for static analysis of Kubernetes components
Prevent misconfigurations and optimize your Kubernetes deployments with Checkov. Discover how this powerful static analysis tool helps ensure efficient and secure cloud-native applications.
Harden your virtual private server against attackers
Learn how to secure your Civo instance with SSH hardening, firewall setup, and automated backups. Protect your system from unauthorized access. Take control of your server's security now!