Mar 18, 2024 • Wiz Security Research
Sailing Securely Across the SDLC: Introducing Wiz's Image Trust and Kubernetes Audit Log Collector
This article is a vendor announcement from Wiz regarding new security capabilities rather than a threat intelligence report detailing specific adversarial...
Executive Summary
This article is a vendor announcement from Wiz regarding new security capabilities rather than a threat intelligence report detailing specific adversarial activities. It introduces Image Trust and a Kubernetes Audit Log Collector designed to enhance application security across the Software Development Life Cycle (SDLC). The primary focus is on defensive measures, enabling organizations to deploy only trusted container images and monitor Kubernetes control planes in near-real time. While no specific threat actors, malware families, or active campaigns are identified within the text, the tools aim to mitigate risks associated with supply chain compromises and unauthorized cluster modifications. Consequently, there are no immediate impacts from adversarial actions to report. Security teams should view this as an update on available defensive technologies for containerized environments rather than actionable intelligence on current threats. No specific mitigation steps for active incidents are provided, as the content serves as a product feature overview.
Summary
Secure your applications across the SDLC by deploying only trusted images and monitoring your Kubernetes control plane in near-real time to detect potential threats.
Published Analysis
This article is a vendor announcement from Wiz regarding new security capabilities rather than a threat intelligence report detailing specific adversarial activities. It introduces Image Trust and a Kubernetes Audit Log Collector designed to enhance application security across the Software Development Life Cycle (SDLC). The primary focus is on defensive measures, enabling organizations to deploy only trusted container images and monitor Kubernetes control planes in near-real time. While no specific threat actors, malware families, or active campaigns are identified within the text, the tools aim to mitigate risks associated with supply chain compromises and unauthorized cluster modifications. Consequently, there are no immediate impacts from adversarial actions to report. Security teams should view this as an update on available defensive technologies for containerized environments rather than actionable intelligence on current threats. No specific mitigation steps for active incidents are provided, as the content serves as a product feature overview. Secure your applications across the SDLC by deploying only trusted images and monitoring your Kubernetes control plane in near-real time to detect potential threats. Secure your applications across the SDLC by deploying only trusted images and monitoring your Kubernetes control plane in near-real time to detect potential threats.