Why do we use SELinux Policies as it overlaps other controls such as Linux Namespaces, K8S/Container security?

While learning SELinux policies in the Container/Kubernetes environment, I realized that there are other layers of controls that overlap with SELinux.
In these cases, what additional value can I can obtain from using SELinux?
Examples are:… Continue reading Why do we use SELinux Policies as it overlaps other controls such as Linux Namespaces, K8S/Container security?

How does Kubernetes Pod Security Standard (PSS) differ from Pod Security Policies (PSP) from design?

Why are we replacing PSP with PSS? What are the motivations and changes in fundamental design?
Both PSS and PSP’s objective is to only permit Pods that fulfill a set of secure criteria and conditions before they can be deployed. Examples w… Continue reading How does Kubernetes Pod Security Standard (PSS) differ from Pod Security Policies (PSP) from design?

Does Log4Shell ("CVE-2021-44228 ") affect K8S/Containers and function-as-a-service (FaaS)?

Does Log4Shell ("CVE-2021-44228") affect K8S/Containers and/or function-as-a-service (FaaS) running image with affected log4j?
I would like to understand if this vulnerability affects ephemeral setups such as K8S/FaaS and how JND… Continue reading Does Log4Shell ("CVE-2021-44228 ") affect K8S/Containers and function-as-a-service (FaaS)?

Tools for "scanning" container (hardening) vulnerabilities vs tools for "performing" the hardening [closed]

CIS has published a list of container vulnerabilities that should be addressed to complete the hardening process.

Are there separate sets of tools that only point out the vulnerabilities
and then tools that "fix" the vulnerabili… Continue reading Tools for "scanning" container (hardening) vulnerabilities vs tools for "performing" the hardening [closed]