Guides for cybersecurity

How to mitigate Kubernetes runtime security threats thumbnail
How to mitigate Kubernetes runtime security threats

Learn how to secure your Kubernetes cluster and protect your applications from runtime security threats, including analyzing vulnerabilities, detecting breaches, and implementing preventive measures.

Automating Container Image Signing with Cosign and Github Actions thumbnail
Automating Container Image Signing with Cosign and Github Actions

Learn more about supply chain attacks, using the Sigstore project and Cosign for signing container images, and integrating them with GitHub actions.

Rate-limiting applications with Nginx Ingress thumbnail
Rate-limiting applications with Nginx Ingress

Learn how to implement rate-limiting using the NGINX Ingress controller in a Kubernetes environment. This tutorial covers the benefits of rate-limiting and a step-by-step guide on setting up rate-limiting.

Validating K8s configuration files to prevent misconfiguration thumbnail
Validating K8s configuration files to prevent misconfiguration

Delve into the significance of validating Kubernetes configuration files to avoid common pitfalls and explore our practical demonstration of how to do all this using Civo's managed Kubernetes service.

How to enforce Kubernetes best practices using ValidKube and Kubescape thumbnail
How to enforce Kubernetes best practices using ValidKube and Kubescape

Learn how to audit your manifest files and scan clusters to ensure you're following best practice

Mastering Modern Backup with Kasten K10 for Kubernetes thumbnail
Mastering Modern Backup with Kasten K10 for Kubernetes

Discover the power of Kasten K10, the Kubernetes backup solution by Veeam, and learn how to set it up on Kubernetes. Step-by-step guide for easy deployment and recovery.

Securing a K3s cluster with Falco thumbnail
Securing a K3s cluster with Falco

This guide provides instructions to secure a K3s cluster using Falco, an open-source cloud-native runtime security project.

Ensuring YAML best practices using KubeLinter thumbnail
Ensuring YAML best practices using KubeLinter

When we declare various Kubernetes objects in YAML, can we have YAML checked prior to the deployment of applications or even Helm charts? The answer is yes - with a tool like KubeLinter

Using Checkov for static analysis of Kubernetes components thumbnail
Using Checkov for static analysis of Kubernetes components

Prevent misconfigurations and optimize your Kubernetes deployments with Checkov. Discover how this powerful static analysis tool helps ensure efficient and secure cloud-native applications.

Harden your virtual private server against attackers thumbnail
Harden your virtual private server against attackers

Learn how to secure your Civo instance with SSH hardening, firewall setup, and automated backups. Protect your system from unauthorized access. Take control of your server's security now!

Need help with something else?