Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing

This page summarizes the projects mentioned and recommended in the original post on dev.to

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • k8s-security-demo

  • git clone https://github.com/IronCore864/k8s-security-demo.git git fetch origin pull/12/head git checkout -b aws_eks FETCH_HEAD cd k8s-security-demo # edit the config.tf and update the AWS region accordingly # configure your aws_access_key_id and aws_secret_access_key terraform init terraform apply

  • trivy

    Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

  • It's an open-source project by Aqua Security and you might have already known them because of their other project trivy which is a scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues.

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • krew

    📦 Find and install kubectl plugins

  • The easiest way to install kubectl-who-can is by Krew, which is the plugin manager for kubectl CLI tool. Assuming you have already installed krew, you can simply run:

  • rbac-lookup

    Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster

  • RBAC Lookup is a CLI that allows you to easily find Kubernetes roles and cluster roles bound to any user, service account, or group name. It helps to provide visibility into Kubernetes auth.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts