Learn the basics of open-source license compliance and discover how to adopt a proactive, developer-first approach to open-source security.
Our new Kubernetes Admission features Checkov as the core validator for Kubernetes manifests, preventing vulnerable or misconfigured Kubernetes objects from being deployed.
Learn about CVE-2022-0185, the latest Linux kernel vulnerability that allows container escape in Kubernetes, and how Checkov’s built-in policies mitigate it.
Read about Checkov's preventative approach to ensuring Kubernetes clusters with NGINX Ingress do not fall victim to the recently published CVE-2021-25742.
Even the most popular web server deployment has insecure defaults. Here, we identify misconfigurations in default K8s NGINX deployments.
Automate AWS Config compliance fixes for infrastructure as code misconfigurations using Yor and Slack notifications.
With Yor, you can trace a misconfigured cloud resource back to code and pinpoint the ideal fix location in git.