Guides for cybersecurity
How to enforce Kubernetes best practices using ValidKube and Kubescape
Learn how to audit your manifest files and scan clusters to ensure you're following best practice
How to mitigate Kubernetes runtime security threats
Learn about analysis of Kubernetes runtime security threats, their detection and prevention
Connect your Kubernetes cluster to GitLab
This guide details how you can connect your Civo Kubernetes cluster with your GitLab account.
Securing a K3s cluster with Falco
This guide provides instructions to secure a K3s cluster using Falco, an open-source cloud-native runtime security project.
Ensuring YAML best practices using KubeLinter
When we declare various Kubernetes objects in YAML, can we have YAML checked prior to the deployment of applications or even Helm charts? The answer is yes - with a tool like KubeLinter
Using Checkov for static analysis of Kubernetes components
This guide will run you through using Checkov to perform static analysis of Kubernetes objects such as deployments
Harden Your Virtual Private Server Against Attackers
There are a number of ways malicious users will try to gain access to unsecured or vulnerable systems, and awareness of these ways means an ability to mitigate the risk of someone using your system for unauthorised purposes.