Palo Alto Networks

policy as code

How to Embrace Kubernetes Security With Checkov’s Graph Connections

Due to the interconnected nature of Kubernetes, embracing Kubernetes security involves some unique considerations. Everything in Kubernetes is interconnected, so you can’t fully understand a Kubernetes deployment without thinking about what components are connected within the deployment. For example, you can’t have an application without a deployment and a few pods attached to some kind of ingress....

May 17, 2023

Subscribe to Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.