- ‣ Trend Micro Attacks on Cryptomining Docker
- ‣ Amazon Launches for CloudFront Security Savings Bundle
- ‣ Google's cloud business lost over $ 5.5 billion last year
- ‣ Microsoft Azure Functions Vulnerable to Docker Escape Bug
- ‣ Pinecone, a serverless vector database for machine learning, leaves stealth with $10M funding
- ‣ Researchers detect new malware targeting Kubernetes clusters to mine Monero
- ‣ GitLab Changes its Pricing Plan; Drops Starter Tier
- ‣ Microsoft Security Business Surpasses $10 Billion in Revenue
- ‣ Researchers uncover a 10-year old vulnerability in Linux
- ‣ IBM Introduces New Cloud Pricing
- ‣ AWS to offer free eight-week training
- ‣ IBM acquires cloud consultancy firm - Taos Mountain
- ‣ Driftctl: A Tool to detect Infrastructure Drifts
- ‣ New Work From Home Expansion From OpsRamp Network.
Stackrox announces the release of KubeLinter
Nov. 9, 2020, 2:03 p.m.
Stackrox, Inc., the California-based market leader in Kubernetes security recently announced the release of its open-source tool KubeLinter. KubeLinter is a static analysis tool that helps identify any misconfigurations in the Kubernetes deployment.
KubeLinter offers the automated analysis of Kubernetes YAML files and HELM charts before deployment.
KubeLinter integrates security-as-a-code in DevOps and other related processes. It helps ensure that the Kubernetes configuration is correct and the automatic enforcement of security policies for Kubernetes applications.
As per Stackrox reports, 67% of all Kubernetes misconfigurations happen due to human error.
With KubeLinter, users can build security in the configuration as code in the application development process itself. It helps validate that the Kubernetes configuration is according to the security best practices.
KubeLinter users can integrate this tool to automate the process of carrying out configuration checks and errors identification.
KubeLinter is available for download at GitHub.
Stackrox’s new static analysis tool KubeLinter fulfills the need for a security tool that identifies misconfigurations before the deployment of a Kubernetes cluster. KubeLinter has been written in the Go programming language and accomplishes the security needs in a single binary file that developers can run in a command line.
KubeLinter offers an automated way to carry out Kubernetes configuration checks as part of continuous integration (CI) workflow. It makes it easier to track how changes are proposed and made to YAML files and Helm charts.
The importance of security in Kubernetes deployments has led more companies to build tools to enhance security and reduce the occurrence of security incidents at runtime. Some other tools similar to KubeLinter are:
- Kubeval: It is used for the validation of single or multiple Kubernetes configuration files. It may be used locally as part of the development workflow or in CI pipelines.
- Kube-score: It performs static code analysis of Kubernetes object definitions and provides a list of recommendations to make your application more resilient and secure.
- Config-lint: It is a command-line tool that uses YAML-specified rules to validate configuration files.
- Copper: Copper validates your configuration files and helps apply policies and best practices to your Kubernetes configurations.
- Conftest: It helps you write tests against structured configuration data.
- Polaris: Polaris runs a litany of tests to ensure that the configuration of Kubernetes pods and controllers is done using best practices.
Stackrox also plans to add auto-remediation capabilities to Kubelinter in the future.
We developed KubeLinter to provide the Kubernetes community with a better, more automated way to identify misconfigurations and deviations from best practices that limit organizations from realizing the full potential of cloud-native applications.Ali GolshanCo-founder and CTO, StackRox