{"id":6600,"date":"2021-04-04T07:44:03","date_gmt":"2021-04-04T04:44:03","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=6600"},"modified":"2021-04-05T12:07:09","modified_gmt":"2021-04-05T09:07:09","slug":"kubernetes-security-checklist-download","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/kubernetes-security-checklist-download\/","title":{"rendered":"\u05e6'\u05e7\u05dc\u05d9\u05e1\u05d8 \u2013 \u05d0\u05d1\u05d8\u05d7\u05ea Kubernetes (\u05de\u05e1\u05de\u05da \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4)"},"content":{"rendered":"<p>\u05e7\u05d5\u05d1\u05e8\u05e0\u05d8\u05d9\u05d6 (Kubernetes) \u05d4\u05e4\u05db\u05d4 \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05d4\u05e4\u05e2\u05dc\u05d4 \u05e9\u05dc \u05d4\u05e2\u05e0\u05df. \u05d4\u05d9\u05d0 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05dc\u05d0\u05e8\u05d5\u05d6 \u05d1\u05e7\u05dc\u05d5\u05ea \u05d0\u05ea \u05d4\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d4 \u05e9\u05dc\u05d4\u05dd \u05dc\u05ea\u05d5\u05da microservices \u05e0\u05d9\u05d9\u05d3\u05d9\u05dd (\u05e9\u05e0\u05d9\u05ea\u05df \u05dc\u05e0\u05d9\u05d9\u05d3 \u05d5\u05dc\u05d4\u05e2\u05d1\u05d9\u05e8).<br \/>\n\u05d9\u05d7\u05d3 \u05e2\u05dd \u05d6\u05d0\u05ea \u05e7\u05d5\u05d1\u05e8\u05e0\u05d8\u05d9\u05e1 \u05de\u05d0\u05ea\u05d2\u05e8\u05ea \u05de\u05d0\u05d5\u05d3 \u05dc\u05ea\u05e4\u05e2\u05d5\u05dc, \u05d1\u05e4\u05e8\u05d8 \u05d1\u05d4\u05d9\u05d1\u05d8\u05d9 \u05d4- security. \u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05d5\u05d0\u05e0\u05e9\u05d9 DevOps \u05de\u05d6\u05e0\u05d9\u05d7\u05d9\u05dd \u05dc\u05e2\u05ea\u05d9\u05dd \u05d0\u05ea \u05e0\u05d5\u05e9\u05d0\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5\u05d4- security \u05d5\u05de\u05e9\u05d0\u05d9\u05e8\u05d9\u05dd \u05d6\u05d0\u05ea \u05dc\u05e1\u05d5\u05e3 (\u05d0\u05dd \u05d1\u05db\u05dc\u05dc).<\/p>\n<h3>Kubernetes \u05d3\u05d5\u05e8\u05e9 \u05d2\u05d9\u05e9\u05d4 \u05d7\u05d3\u05e9\u05d4 \u05dc- Security<\/h3>\n<p>\u05db\u05dc\u05d9 security \u05d5\u05ea\u05d9\u05e7\u05d9\u05dd \u05dc\u05d0 \u05de\u05d5\u05ea\u05d0\u05de\u05d9\u05dd \u05dc\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea cloud-native \u00a0\u05d5\u05e0\u05db\u05e9\u05dc\u05d9\u05dd \u05dc\u05ea\u05ea visibility \u05dc\u05e1\u05d1\u05d9\u05d1\u05d5\u05ea \u05d3\u05d9\u05e0\u05d0\u05de\u05d9\u05d5\u05ea \u05e2\u05dd moving parts .<br \/>\n45% \u05de\u05d4\u05e7\u05d5\u05e0\u05d8\u05d9\u05d9\u05e0\u05e8\u05d9\u05dd \u05d7\u05d9\u05d9\u05dd \u05dc 5 \u05d3\u05e7\u05d5\u05ea \u05dc\u05db\u05dc \u05d4\u05d9\u05d5\u05ea\u05e8 (\u05dc\u05e4\u05d9 \u05e1\u05e7\u05e8 \u05e9\u05e0\u05e2\u05e8\u05da \u05d5\u05e7\u05d9\u05e9\u05d5\u05e8 \u05d0\u05dc\u05d9\u05d5 \u05d1\u05d4\u05de\u05e9\u05da) , \u05de\u05d4 \u05e9\u05d4\u05d5\u05e4\u05da \u05d0\u05ea \u05d4\u05d7\u05e7\u05d9\u05e8\u05d4 \u05d0\u05d7\u05e8 \u05d0\u05e0\u05d5\u05de\u05dc\u05d9\u05d5\u05ea \u05d5\u05e4\u05d9\u05e8\u05e6\u05d5\u05ea &#8211; \u05dc\u05de\u05d0\u05ea\u05d2\u05e8\u05ea \u05d1\u05de\u05d9\u05d5\u05d7\u05d3.<\/p>\n<p>\u05d0\u05d7\u05d3 \u05de\u05d4\u05d3\u05d1\u05e8\u05d9\u05dd \u05d4\u05e2\u05d9\u05e7\u05e8\u05d9\u05d9\u05dd \u05d1- cloud-native security \u05d4\u05d5\u05d0 \u05dc\u05d8\u05e4\u05dc \u05d1\u05d1\u05e2\u05d9\u05d5\u05ea \u05db\u05de\u05d4 \u05e9\u05d9\u05d5\u05ea\u05e8 \u05de\u05d5\u05e7\u05d3\u05dd (\u05d2\u05d9\u05e9\u05ea &quot;Shift Left&quot;). \u05d8\u05d9\u05e4\u05d5\u05dc \u05de\u05d0\u05d5\u05d7\u05e8 \u05d9\u05d4\u05d9\u05d4 \u05d9\u05e7\u05e8 \u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05e2\u05dc\u05d4 \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5- compliance .<\/p>\n<p><strong>\u05d4\u05de\u05e1\u05de\u05da \u05d4\u05d1\u05d0 (PDF \u05e9\u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4),<\/strong> \u05de\u05db\u05d9\u05dc \u05e6'\u05e7\u05dc\u05d9\u05e1\u05d8 \u05d5\u05de\u05d3\u05e8\u05d9\u05da \u05dc\u05d1\u05d7\u05d9\u05e8\u05ea \u05d4\u05d2\u05d9\u05e9\u05d4 \u05dc- security \u05d5\u05d0\u05d1\u05d8\u05d7\u05d4 \u05db\u05d0\u05e9\u05e8 \u05d0\u05ea\u05dd \u05e2\u05d5\u05e9\u05d9\u05dd \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1- containers \u05d5- Kubernetes.<\/p>\n<p>\u05d4\u05e9\u05dc\u05d1\u05d9\u05dd \u05de\u05d5\u05e1\u05d1\u05e8\u05d9\u05dd \u05d1\u05d0\u05e8\u05d9\u05db\u05d5\u05ea \u05d1\u05de\u05e1\u05de\u05da.\u00a0 5 \u05d4\u05e9\u05dc\u05d1\u05d9\u05dd \u05d1\u05e7\u05e6\u05e8\u05d4 \u05d4\u05dd:<\/p>\n<ol>\n<li dir=\"ltr\" style=\"text-align: left;\">Threat Prevention with Admission Controllers<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Securing the Kubernetes Control Plane<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Securing Workloads at Runtime<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Kubernetes Native Network Segmentation<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Incident Response and Forensics<\/li>\n<\/ol>\n<div class=\"side-form\" style=\"margin: 0 auto;\">\n<h3>\u05dc\u05e7\u05d1\u05dc\u05ea \u05d4\u05de\u05e1\u05de\u05da \u05d0\u05e0\u05d0 \u05de\u05dc\u05d0\u05d5 \u05d0\u05ea \u05e4\u05e8\u05d8\u05d9\u05db\u05dd \u05db\u05d0\u05df:<\/h3>\n<p>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f6614-o1\" lang=\"he-IL\" dir=\"rtl\" data-wpcf7-id=\"6614\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/blog_he\/wp-json\/wp\/v2\/posts\/6600#wpcf7-f6614-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"6614\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"he_IL\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f6614-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"gitlab-form full-width-form\">\n\t<p><label>* \u05e9\u05dd \u05e4\u05e8\u05d8\u05d9 \u05d5\u05de\u05e9\u05e4\u05d7\u05d4:<\/label>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t<\/p>\n\t<p><label>* \u05d0\u05d9\u05de\u05d9\u05d9\u05dc:<\/label>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"\u05e0\u05d0 \u05dc\u05e6\u05d9\u05d9\u05df \u05de\u05d9\u05d9\u05dc \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 (\u05d7\u05d1\u05e8\u05d4) \u05d1\u05dc\u05d1\u05d3\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"referer-page\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text referer-page\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"referer-page\" \/><\/span>\n\t<\/p>\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner button button-large\" type=\"submit\" value=\"\u05e9\u05dc\u05d7\u05d5 \u05dc\u05d9 \u05d0\u05ea \u05d4-PDF\" \/>\n\t<\/p>\n<\/div><div class=\"wpcf7-form-control-wrap maspik-field\">\n                <label for=\"full-name-maspik-hp\" class=\"wpcf7-form-control-label\">Leave this field empty<\/label>\n                <input size=\"1\" type=\"text\" autocomplete=\"off\" aria-hidden=\"true\" tabindex=\"-1\" name=\"full-name-maspik-hp\" id=\"full-name-maspik-hp\" class=\"wpcf7-form-control wpcf7-text\" placeholder=\"Leave this field empty\">\n            <\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6601\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/04\/securing-kubernetes-checklist.jpg\" alt=\"securing kubernetes checklist\" width=\"438\" height=\"401\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/04\/securing-kubernetes-checklist.jpg 763w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/04\/securing-kubernetes-checklist-300x275.jpg 300w\" sizes=\"auto, (max-width: 438px) 100vw, 438px\" \/>\n<\/div>\n<p>&nbsp;<\/p>\n<p>\u05d4\u05de\u05e1\u05de\u05da \u05d4\u05d5\u05db\u05df \u05e2&quot;\u05d9 \u05d7\u05d1\u05e8\u05ea Sysdig \u05d0\u05d5\u05ea\u05d4 \u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05e2\u05d5\u05dc\u05dd.<\/p>\n<h3>\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/technology-containers-short-lifespans-are-getting-even-shorter\/\" target=\"_blank\" rel=\"noopener\">\u05e8\u05d5\u05d1 \u05d4\u05e7\u05d5\u05e0\u05d8\u05d9\u05d9\u05e0\u05e8\u05d9\u05dd \u05d7\u05d9\u05d9\u05dd \u05e4\u05d7\u05d5\u05ea \u05de- 5 \u05d3\u05e7\u05d5\u05ea<\/a> (\u05de\u05d0\u05de\u05e8 \u05d1- ZDNet)<\/li>\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/what-is-sysdig\/\" target=\"_blank\" rel=\"noopener\">\u05de\u05d4 \u05d6\u05d4 Sysdig<\/a> ?<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u05e7\u05d5\u05d1\u05e8\u05e0\u05d8\u05d9\u05d6 (Kubernetes) \u05d4\u05e4\u05db\u05d4 \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05d4\u05e4\u05e2\u05dc\u05d4 \u05e9\u05dc \u05d4\u05e2\u05e0\u05df. \u05d4\u05d9\u05d0 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05dc\u05d0\u05e8\u05d5\u05d6 \u05d1\u05e7\u05dc\u05d5\u05ea \u05d0\u05ea \u05d4\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d4 \u05e9\u05dc\u05d4\u05dd \u05dc\u05ea\u05d5\u05da microservices \u05e0\u05d9\u05d9\u05d3\u05d9\u05dd (\u05e9\u05e0\u05d9\u05ea\u05df \u05dc\u05e0\u05d9\u05d9\u05d3 \u05d5\u05dc\u05d4\u05e2\u05d1\u05d9\u05e8). \u05d9\u05d7\u05d3 \u05e2\u05dd \u05d6\u05d0\u05ea \u05e7\u05d5\u05d1\u05e8\u05e0\u05d8\u05d9\u05e1 \u05de\u05d0\u05ea\u05d2\u05e8\u05ea \u05de\u05d0\u05d5\u05d3 \u05dc\u05ea\u05e4\u05e2\u05d5\u05dc, \u05d1\u05e4\u05e8\u05d8 \u05d1\u05d4\u05d9\u05d1\u05d8\u05d9 \u05d4- security. \u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05d5\u05d0\u05e0\u05e9\u05d9 DevOps \u05de\u05d6\u05e0\u05d9\u05d7\u05d9\u05dd \u05dc\u05e2\u05ea\u05d9\u05dd \u05d0\u05ea \u05e0\u05d5\u05e9\u05d0\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5\u05d4- security \u05d5\u05de\u05e9\u05d0\u05d9\u05e8\u05d9\u05dd \u05d6\u05d0\u05ea \u05dc\u05e1\u05d5\u05e3 (\u05d0\u05dd \u05d1\u05db\u05dc\u05dc). Kubernetes \u05d3\u05d5\u05e8\u05e9 \u05d2\u05d9\u05e9\u05d4 \u05d7\u05d3\u05e9\u05d4 \u05dc- Security \u05db\u05dc\u05d9 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60,189,250,164,566,477],"tags":[572,478,571],"class_list":["post-6600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","category-devsecops","category-docker","category-kubernetes","category-microservices","category-sysdig","tag-checklist","tag-cloud-native","tag-download"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/6600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=6600"}],"version-history":[{"count":0,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/6600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/6618"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=6600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=6600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=6600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}