<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Lacework</title>
    <description>The latest articles on Forem by Lacework (@lacework).</description>
    <link>https://forem.com/lacework</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4426%2Fbf1b15dd-f30b-4c66-a094-f032ed1937f0.png</url>
      <title>Forem: Lacework</title>
      <link>https://forem.com/lacework</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/lacework"/>
    <language>en</language>
    <item>
      <title>5 tips to help you secure your Kubernetes deployments</title>
      <dc:creator>Allie Fick Lavin</dc:creator>
      <pubDate>Tue, 07 Nov 2023 15:31:20 +0000</pubDate>
      <link>https://forem.com/lacework/5-tips-to-help-you-secure-your-kubernetes-deployments-4449</link>
      <guid>https://forem.com/lacework/5-tips-to-help-you-secure-your-kubernetes-deployments-4449</guid>
      <description>&lt;p&gt;Are your Kubernetes deployments secure?&lt;/p&gt;

&lt;p&gt;Developers creating cloud-native apps that run in Kubernetes are now tasked with much more than just coding. From defining the Infrastructure as Code (IaC) to managing role-based access control, every decision you make impacts security — and this can get complicated quickly. &lt;/p&gt;

&lt;p&gt;Here are a few tips to help you ace Kubernetes security:&lt;/p&gt;

&lt;p&gt;✅ Scan code and IaC&lt;/p&gt;

&lt;p&gt;All code must be validated while you are writing or committing it to a project. Conduct static application security testing on your code. But don’t stop there. Scan Dockerfiles, Helm, and even Terraform files for misconfigurations.&lt;/p&gt;

&lt;p&gt;✅ Continuous integration (CI) is key&lt;/p&gt;

&lt;p&gt;CI isn’t just for ensuring your app works. Integrate security checks for both source code and the compiled application. For example, when building a Docker image from a Dockerfile, you need to also assess the security of the OS and software packages that will be included in the image. &lt;/p&gt;

&lt;p&gt;✅ Deploy with confidence&lt;/p&gt;

&lt;p&gt;Before that final deployment, utilize Kubernetes' admission controller. This little gatekeeper ensures nothing unauthorized sneaks past into production. And if you're not quite ready for an admission controller, the Kubernetes audit logs will be your eyes and ears for potential risks.&lt;/p&gt;

&lt;p&gt;✅ Never sleep on runtime monitoring&lt;/p&gt;

&lt;p&gt;Think deployment's the end? Think again. During runtime, you’ll need to look for misconfigurations in managed Kubernetes environments, like EKS and GKE. Stay alert for any new application behaviors like unexpected connections or sudden file writes. Make sure to baseline normal application behavior, and be quick to spot unusual behavior.&lt;/p&gt;

&lt;p&gt;✅ Look closely at audit logs&lt;/p&gt;

&lt;p&gt;Kubernetes security posture management tools are an important part of a defense-in-depth approach to Kubernetes security, but they’re not the be-all-end-all. Why? They can overlook application behavior and miss threats right under their noses. The key? Look closely at Kubernetes audit logs to understand the specifics of each resource and see the real-time activities in your environment, rather than just the potential risks.&lt;/p&gt;

&lt;p&gt;Read &lt;a href="https://www.lacework.com/blog/a-developers-guide-securing-cloud-native-applications-in-kubernetes/" rel="noopener noreferrer"&gt;this blog&lt;/a&gt; for more K8 best practices.  &lt;/p&gt;

&lt;p&gt;What are your best tips for securing your cloud-native apps in Kubernetes?&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>kubernetes</category>
      <category>kubecon</category>
      <category>devops</category>
    </item>
    <item>
      <title>The role software developers play in the cybersecurity space</title>
      <dc:creator>Kedasha</dc:creator>
      <pubDate>Thu, 10 Mar 2022 19:54:49 +0000</pubDate>
      <link>https://forem.com/lacework/the-role-software-developers-play-in-the-cybersecurity-space-1jh2</link>
      <guid>https://forem.com/lacework/the-role-software-developers-play-in-the-cybersecurity-space-1jh2</guid>
      <description>&lt;p&gt;Cybersecurity is the intentional practice of securing networks, data, and devices from unauthorized users. With the growing increase in cyberattacks and security vulnerabilities (most recently, the &lt;a href="https://www.lacework.com/blog/log4j-and-whatever-comes-next/"&gt;Log4j vulnerability&lt;/a&gt;), it’s becoming increasingly important for developers to understand how to secure applications and think like cybercriminals to prevent these attacks from severely harming customers.&lt;/p&gt;

&lt;p&gt;As software developers, we have a unique opportunity to be one of the first lines of defense against cyberattacks. The software development lifecycle focuses on implementing core functionality in software and applications; code quality and security is often an afterthought. However, our understanding of core cybersecurity principles can make or break the applications that we build. &lt;/p&gt;

&lt;p&gt;Since 2003, the Open Web Application Security Project (OWASP) has highlighted the 10 most critical security risks to web applications via &lt;a href="https://owasp.org/www-project-top-ten/"&gt;OWASP Top 10 list&lt;/a&gt;. This is “globally recognized by developers as the first step towards more secure coding.” However, some of the same vulnerabilities appear year over year with little to no improvements on the quality of software code being deployed to production environments.&lt;/p&gt;

&lt;p&gt;Organizations deem it unacceptable for software teams to knowingly ship products with functional defects. It is time for organizations to also find it unacceptable to ship products with security defects. Security starts and ends with us - the developers. Unless a software team intentionally focuses on code quality and security, vulnerabilities will find their way into shipped products, and cybercriminals will exploit those vulnerabilities.&lt;/p&gt;

&lt;p&gt;As developers, we can help prevent cyberattacks by proactively implementing security controls in our code.  We can accomplish this in the following ways:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Take the time to resolve high-severity alerts by keeping packages and dependencies updated. We can use tools like &lt;a href="https://github.com/renovatebot/renovate"&gt;Renovate&lt;/a&gt; and &lt;a href="https://www.whitesourcesoftware.com/"&gt;WhiteSource&lt;/a&gt; to automatically scan for updates. &lt;/li&gt;
&lt;li&gt;Identify and understand the typical vulnerabilities for our tech stacks. We can use a tool such as the &lt;a href="https://cve.mitre.org/cve/search_cve_list.html"&gt;CVE&lt;/a&gt; to search for vulnerabilities in the software that we use. &lt;/li&gt;
&lt;li&gt;Test for what our code is and is not meant to do. &lt;/li&gt;
&lt;li&gt;Upskill by taking security courses on platforms such as Udemy. For example, this course teaches &lt;a href="https://www.udemy.com/course/cybersecurity-for-developers-1/"&gt;cybersecurity for developers&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Understand how to perform security testing such as vulnerability scanning and penetration tests. There are many tools available to automate this.&lt;/li&gt;
&lt;li&gt;Review the &lt;a href="https://owasp.org/www-project-top-ten/"&gt;OWASP Top 10 list&lt;/a&gt; to understand the most common security attacks and how to prevent them. &lt;/li&gt;
&lt;li&gt;At the very least, be familiar with the following three attacks:

&lt;ul&gt;
&lt;li&gt;Broken access control&lt;/li&gt;
&lt;li&gt;Cryptographic failures&lt;/li&gt;
&lt;li&gt;Injection attacks&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We control the security of the software and applications we build with code. Understanding cybersecurity is important because it protects the users and intellectual property of the companies that we work for. &lt;/p&gt;

&lt;p&gt;Come learn security with me in the &lt;a href="https://community.lacework.com/c/cloud-fundamentals/19"&gt;Lacework Community&lt;/a&gt;, where I’ll cover fundamental security topics for software developers.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>softwaredevelopers</category>
      <category>beginners</category>
    </item>
    <item>
      <title>What I Learned About the Log4j Vulnerability</title>
      <dc:creator>Tessa Kriesel</dc:creator>
      <pubDate>Tue, 21 Dec 2021 13:37:49 +0000</pubDate>
      <link>https://forem.com/lacework/what-i-learned-about-the-log4j-vulnerability-17l4</link>
      <guid>https://forem.com/lacework/what-i-learned-about-the-log4j-vulnerability-17l4</guid>
      <description>&lt;p&gt;I was excited to join Lacework for many reasons, but one of the most important was that it provided me with an opportunity to teach developers about security. Developers complete many different courses and training to prepare them for their careers, but security is often an afterthought. There is a subset of us writing lines and lines of code each day, without the background knowledge to ensure that code is secure. &lt;/p&gt;

&lt;p&gt;You’ve likely heard the Log4j vulnerability mentioned over the past few days, or seen the memes floating around the internet—and if you’re like me, or not a Java dev, you may be wondering what it is and why so many people are concerned about it. Distinguished Cloud Strategist &lt;a href="https://dev.to/marknca"&gt;Mark Nunnikhoven&lt;/a&gt; broke it down in an easy-to-understand &lt;a href="https://www.linkedin.com/posts/marknca_hugops-cybersecurity-log4j-activity-6876932435272101888-l8Iz/" rel="noopener noreferrer"&gt;4-minute video&lt;/a&gt;, which helped bring things into perspective. &lt;strong&gt;Log4j&lt;/strong&gt; is an open-source library that developers use to help figure out what's going on with their applications that are written in the Java programming language. The reason why you’re hearing about it now is because there was a serious security issue and attackers could easily use one of the library’s features to run their code on your systems, and those attackers want to do that to profit from your resources and data. I’ve heard so much information about this over the past few days—to narrow it down for you, here the things that I think are most important for developers to know: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;You’re likely only affected if &lt;strong&gt;your projects are written in Java.&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;If you use Java, you should go through your Github repositories and &lt;strong&gt;check to see if they include Log4J&lt;/strong&gt;. &lt;/li&gt;
&lt;li&gt;Use an open source vulnerability scanning tool to figure out if specific systems are affected. Jfrog &lt;a href="https://github.com/jfrog/log4j-tools" rel="noopener noreferrer"&gt;released a tool&lt;/a&gt; that can help you determine if your code includes Log4j and a script that helps you &lt;strong&gt;find where Log4j is within your code&lt;/strong&gt;. &lt;/li&gt;
&lt;li&gt;It’s important to understand &lt;em&gt;why&lt;/em&gt; this vulnerability is a big deal. &lt;strong&gt;The attack is so damaging because it’s constantly changing&lt;/strong&gt;—it’s not a one-time thing. Even when you think you’ve resolved it, there are updates to the software and therefore more vulnerabilities and attacks. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We know what it takes to maintain software. Especially during a vulnerability. Our team believes in the power and benefits of open-source software—we recently donated to the Log4j project committers and the Apache Foundation to support those maintainers working tirelessly behind the scenes. Hopefully this additional backing, along with the support of other developers and companies who are committed to finding a resolution, will help us reach the end of this challenge sooner rather than later. &lt;/p&gt;

&lt;p&gt;If you’re interested in learning more about the Log4j vulnerability, &lt;a href="https://dev.to/yawaramin/the-human-toll-of-log4j-maintenance-35ap"&gt;this post about the human toll of Log4j maintenance&lt;/a&gt; provides a helpful overview and timeline of what’s occurred over the past few days.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1473370596985610243-954" src="https://platform.twitter.com/embed/Tweet.html?id=1473370596985610243"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1473370596985610243-954');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1473370596985610243&amp;amp;theme=dark"
  }



&lt;/p&gt;

</description>
      <category>security</category>
      <category>log4j</category>
    </item>
    <item>
      <title>How will Lacework’s acquisition of Soluble benefit devs?</title>
      <dc:creator>Tessa Kriesel</dc:creator>
      <pubDate>Fri, 12 Nov 2021 14:09:41 +0000</pubDate>
      <link>https://forem.com/lacework/how-will-laceworks-acquisition-of-soluble-benefit-devs-2i0f</link>
      <guid>https://forem.com/lacework/how-will-laceworks-acquisition-of-soluble-benefit-devs-2i0f</guid>
      <description>&lt;p&gt;I’m absolutely thrilled about Lacework’s newest announcement—we just acquired Soluble, a startup whose mission is to help security and operations teams leverage IaC to scale cloud operations and security for businesses of all sizes. I’m especially excited about what Lacework’s incorporation of the Soluble technology means for devs like yourselves. There are countless benefits, but these are the three that I’m looking forward to the most.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Security and dev teams can quickly and efficiently address problems
&lt;/h3&gt;

&lt;p&gt;IaC is quickly becoming the primary mechanism to manage cloud infrastructure at scale. This shift increases both velocity and risk—to keep up, security and development teams need to quickly address the resulting vulnerabilities or misconfigurations. Integrating the Soluble technology into Lacework’s platform and teaming with Soluble’s experts prepares us to shift further left into developer workflows. &lt;/p&gt;

&lt;h3&gt;
  
  
  Integration is simple—connect with Lacework through Git
&lt;/h3&gt;

&lt;p&gt;Lacework can directly and quickly reach developer audiences. Soluble helps Lacework make security issues easier to solve by correlating cloud misconfigurations to IaC and enabling remediation at the source via pull requests. This expands Lacework’s platform to the places where developers are writing their code: directly in the UX/CLI/GitHub and GitLab. For developers to integrate with Lacework, they simply need to connect through Git. &lt;/p&gt;

&lt;h3&gt;
  
  
  This facilitates security/operations teams and developer partnerships
&lt;/h3&gt;

&lt;p&gt;Soluble shares Lacework’s vision to build a modern, data-driven approach to cloud security. Implementing Soluble’s capabilities to the Lacework platform helps security and operations teams shift further left and partner with developers so they can manage applications and infrastructure efficiently, securely, and reliably.&lt;/p&gt;

&lt;p&gt;I’d love to hear your thoughts on this acquisition in the comments below👇.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>This One Mistake Will Stop a DevSecOps Shift Left Strategy Dead in Its Tracks</title>
      <dc:creator>Mark Nunnikhoven</dc:creator>
      <pubDate>Wed, 10 Nov 2021 18:30:00 +0000</pubDate>
      <link>https://forem.com/lacework/this-one-mistake-will-stop-a-devsecops-shift-left-strategy-dead-in-its-tracks-3hka</link>
      <guid>https://forem.com/lacework/this-one-mistake-will-stop-a-devsecops-shift-left-strategy-dead-in-its-tracks-3hka</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/3L0g2LfCPOQ"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;DevSecOps is the latest in a long line of buzzwords. The core makes sense: work on security earlier. But why isn’t this everywhere? Here’s the biggest mistakes teams are making trying to “do” DevSecOps.&lt;/p&gt;

&lt;p&gt;Learn more in the video 👆 or read through the transcript 👇.&lt;/p&gt;

&lt;h2&gt;
  
  
  Transcript
&lt;/h2&gt;

&lt;p&gt;I see security teams making the same mistake over and over again when it comes to “shifting left.” It’s frustrating from afar and infuriating when you have to deal with it day-to-day.&lt;/p&gt;

&lt;p&gt;Let’s dig in to the disaster that is DevSecOps…&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[00:15]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine for a minute, you’re in your kitchen preparing dinner. You’re a reasonably good home cook. More often than not, what you put on the table is enjoyed by those you’re sharing with it.&lt;/p&gt;

&lt;p&gt;Sure, every once and a while you miss. But that’s the rare case, so when it does happen everyone smiles, you laugh, and then place an order for take out. Mistakes happen.&lt;/p&gt;

&lt;p&gt;Not too bad, right?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[00:29]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now, let’s say while you’re getting ready to sit down for a wonderful home cooked meal, you neighbour invites themselves in. They immediate start hammering you with questions like, “How sharp is that knife?”, “Do you know who grew that broccoli?”, “Are there too many ovens in this neighbourhood?”&lt;/p&gt;

&lt;p&gt;Taken aback, you politely ask, “Um, are you a professional chef? Do you have a lot of experience cooking?”&lt;/p&gt;

&lt;p&gt;They reply, “Oh no, I don’t even have a kitchen in my place. I just order food every once and a while.”&lt;/p&gt;

&lt;p&gt;That’s basically the scenario I see play out in organizations around the world.&lt;/p&gt;

&lt;p&gt;The development teams and builders are working to solve business problems and address customer needs.&lt;/p&gt;

&lt;p&gt;Then the security team shows up out of no where and starts asking seemingly irrelevant questions and demanding that priorities change in the name “reducing risk” and “improving the overall security posture” without understanding what you’re working on or how you work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[01:37]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is why even the name DevSecOps frustrates me to no end. The DevOps philosophy already assumes that you want to build a resilient, reliable system. There’s no need to jam another acronym in there.&lt;/p&gt;

&lt;p&gt;Teams know that security is important, they just need the information and support to make smart decisions at the right time.&lt;/p&gt;

&lt;p&gt;So is this whole “shift left” thing doomed?&lt;/p&gt;

&lt;p&gt;No.&lt;/p&gt;

&lt;p&gt;Not if you do it well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[02:06]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’re on the security team, the first thing you need to understand is that you probably don’t understand how the builders are working.&lt;/p&gt;

&lt;p&gt;You can fix that.&lt;/p&gt;

&lt;p&gt;Spend some time with them. Ask lots of questions to better understand their workflow and concerns.&lt;/p&gt;

&lt;p&gt;Most important of all, make sure that the information from security tools that shift left provide information with the proper context and enough data for teams to make an informed decision.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[02:34]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Just because it’s a security priority, doesn’t mean it’s a business priority.&lt;/p&gt;

&lt;p&gt;For developers and builders, understand that security controls can provide real value to you. The whole goal of these controls is to make sure things work as intended.&lt;/p&gt;

&lt;p&gt;Network security tools look for malicious activity and malformed traffic. You don’t want that anywhere near your app.&lt;/p&gt;

&lt;p&gt;Threat detection on your servers and containers is looking for errant processes and other indicators of compromise. This makes sure that your resources are only working for you instead of doing things like mining cryptocurrency for cybercriminals.&lt;/p&gt;

&lt;p&gt;Posture management—ugh, horrible name—looks at the cloud services you’re using to make sure that you have configured them in a way that matches your risk appetite.&lt;/p&gt;

&lt;p&gt;Vulnerability scanners look at your tech stack trying to find known issue before so they don’t bite you in the you-know-what.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[03:26]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Everything on this list and most of the other security controls out there can dramatic HELP you meet your goals.&lt;/p&gt;

&lt;p&gt;With that understanding, you need to make sure that you have access to the outputs of these tools. You need to know that they are in place and doing their job, so that you can focus on other parts of yours.&lt;/p&gt;

&lt;p&gt;By now, you’ve figured out that the number one mistake I see security teams making when they “shift left” is IGNORING the developers and builders.&lt;/p&gt;

&lt;p&gt;For some reason, security teams assume that to “shift left” means doing their isolated security work earlier in the development process. That’s an archaic way of thinking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;[04:05]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To truly shift left, you need to leverage the capability of security tools and processes to help developers and builders identify risks with their systems earlier in THEIR processes.&lt;/p&gt;

&lt;p&gt;This data will help the teams make informed decisions about what actions should be taken to meet the business goals.&lt;/p&gt;

&lt;p&gt;Shifting security left can help reduce the risks to the business while improving the quality of the systems your build.&lt;/p&gt;

&lt;p&gt;Who wouldn’t want that?&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Lacework VS Code Extension</title>
      <dc:creator>Jeff Thorne</dc:creator>
      <pubDate>Tue, 09 Nov 2021 22:54:00 +0000</pubDate>
      <link>https://forem.com/lacework/lacework-vs-code-extension-18la</link>
      <guid>https://forem.com/lacework/lacework-vs-code-extension-18la</guid>
      <description>&lt;p&gt;The Lacework VS Code vulnerability scanner extension is a new plugin that will quickly identify vulnerabilities in your base images right from your IDE. This is a first step and alpha release with expanded and additional capabilities to be released soon.&lt;/p&gt;

&lt;p&gt;This blog covers how to install lw-scanner and leverage it to perform image assurance scans from within VS Code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Install lw-scanner&lt;/strong&gt;&lt;br&gt;
The plugin assumes that lw-scanner is installed on your local system. Installation instructions can be found here: &lt;a href="https://support.lacework.com/hc/en-us/articles/1500001777821-Integrate-Inline-Scanner" rel="noopener noreferrer"&gt;support.lacework.com&lt;/a&gt; and the the latest release of the scanner binary can be found at &lt;a href="https://github.com/lacework/lacework-vulnerability-scanner/releases" rel="noopener noreferrer"&gt;github.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once lw-scanner is installed the next step is to download the Lacework plugin from the VS Code Marketplace.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqqm15m83nrgrh0ql4pug.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqqm15m83nrgrh0ql4pug.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With an active Dockerfile in the editor you can initiate an image assurance scan by clicking Command+Shift+P on macOS (Control+Shift+P on Windows/Linux).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr9gn23fnzfz3sn2d6yv.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr9gn23fnzfz3sn2d6yv.gif" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once the scan is complete you will see a summary next to the base image that will disappear along with a more detailed scan result available in the output window.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxew9cyj2i9309sm6n917.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxew9cyj2i9309sm6n917.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source code can be found here for now: &lt;a href="https://github.com/jeffthorne/lacework-vscode-extension" rel="noopener noreferrer"&gt;github&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;This is just a quick preview update. For suggestions or feedback please open an issue on the repo. PRs welcomed. Stay tuned for more.&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br&gt;
Jeff&lt;/p&gt;

</description>
      <category>vscode</category>
      <category>javascript</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>Celebrating CascadiaJS </title>
      <dc:creator>Jess West (she/her)</dc:creator>
      <pubDate>Mon, 01 Nov 2021 23:19:07 +0000</pubDate>
      <link>https://forem.com/lacework/celebrating-cascadiajs-3kk3</link>
      <guid>https://forem.com/lacework/celebrating-cascadiajs-3kk3</guid>
      <description>&lt;p&gt;Hey friends! We are super pumped to announce that the FIRST developer conference we’re attending as a Developer Experience team is something near and dear to (my) heart, &lt;a href="https://2021.cascadiajs.com/"&gt;CascadiaJS&lt;/a&gt;. CascadiaJS is a conference that has been traditionally based in Pacific Northwest (PNW). Last year, it went virtual, which brought together developers across the world, literally. This year, the conference team has tackled a new challenge: a hybrid event. We know how much goes into conferences like this and we couldn’t be more thrilled to support this community. In our minds, community is all about supporting and learning from each other. As we build our community for Lacework, we want to learn from the folks at CascadiaJS about how we can best support their needs. &lt;/p&gt;

&lt;p&gt;A handful of us will attend and listen to what is happening in the community and we’d love for you to say hello! Our team will be attending virtually and in-person, so we hope to run into you and help cheer on our fearless speakers and organizers. &lt;/p&gt;

&lt;p&gt;👾 &lt;a href="https://dev.to/vatasha"&gt;Vatasha White&lt;/a&gt;&lt;br&gt;
🏍 &lt;a href="https://dev.to/tessak22"&gt;Tessa Kriesel&lt;/a&gt;&lt;br&gt;
🎤 &lt;a href="https://dev.to/jesswest"&gt;Jessica West&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, we all know the real networking happens at the after-party, so we of course wanted to help be part of that community experience. We are proud to be sponsoring karaoke this year! Does anyone know any cool security karaoke songs? Asking for a friend… See you there!  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://i.giphy.com/media/l0He0B1237tKb5fWM/giphy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://i.giphy.com/media/l0He0B1237tKb5fWM/giphy.gif" width="480" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>conferences</category>
      <category>community</category>
    </item>
    <item>
      <title>Stop Your Password From Opening The Door To Hackers</title>
      <dc:creator>Mark Nunnikhoven</dc:creator>
      <pubDate>Fri, 22 Oct 2021 16:52:53 +0000</pubDate>
      <link>https://forem.com/lacework/stop-your-password-from-opening-the-door-to-hackers-4d3d</link>
      <guid>https://forem.com/lacework/stop-your-password-from-opening-the-door-to-hackers-4d3d</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/iKSuO2hn5oo"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;It's cybersecurity awareness month and we all should be doing out part to &lt;a href="https://twitter.com/hashtag/BeCyberSmart"&gt;#BeCyberSmart&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;The one thing I see people struggling with the most is using passwords and I get it.&lt;/p&gt;

&lt;p&gt;A lot of what we've been subjected too about passwords is &lt;strong&gt;wrong&lt;/strong&gt; and actually makes things less secure. Making matters worse, security folks—myself included!—aren't known as being the most communicative.&lt;/p&gt;

&lt;p&gt;So, I set out to demystify passwords. In the video above 👆, I walk through how passwords are attacked, the UX around them, what makes a truly strong password, and finally I lay out a practical path for dealing with the mishmash of systems out there.&lt;/p&gt;

&lt;p&gt;Here in this post, I'll give you the highlights...&lt;/p&gt;

&lt;h2&gt;
  
  
  Strength
&lt;/h2&gt;

&lt;p&gt;A strong password is a &lt;strong&gt;long&lt;/strong&gt; password...or more probably, a passphrase. &lt;/p&gt;

&lt;p&gt;Length is the single most important factor in determining the strength of a password.&lt;/p&gt;

&lt;p&gt;The second most important factor is the variety of characters you pick from (so, not just a-z). That's the reason for those crazy password rules we're all so familiar with.&lt;/p&gt;

&lt;p&gt;Start thinking pass*&lt;em&gt;phrase&lt;/em&gt;*, not password.&lt;/p&gt;

&lt;h2&gt;
  
  
  Old Rules
&lt;/h2&gt;

&lt;p&gt;Those old rules I mentioned 👆? The whole "at least one capital letter, a number, a symbol, and be at least 8 characters long" thing?&lt;/p&gt;

&lt;p&gt;Those rules actually lead to weaker passwords. &lt;/p&gt;

&lt;p&gt;Thankfully the &lt;a href="https://pages.nist.gov/800-63-3/"&gt;most commonly used guidelines&lt;/a&gt; were updated in 2017 but a lot of systems are still behind the times. That means we still have to deal with them. 😔&lt;/p&gt;

&lt;h2&gt;
  
  
  Password Manager
&lt;/h2&gt;

&lt;p&gt;In addition to dealing with those older systems and rules, we also need different passwords for every site and app we use.&lt;/p&gt;

&lt;p&gt;Why? Because it reduces &lt;strong&gt;your&lt;/strong&gt; risk if one of those sites is hacked or has a breach. &lt;/p&gt;

&lt;p&gt;One of the first things cybercriminals do when they get new credential sets is test them against popular sites.&lt;/p&gt;

&lt;p&gt;But keeping track of all of those passwords is a pain. The solution is to use a password manager. &lt;/p&gt;

&lt;p&gt;Which one doesn't matter much. Just make sure it runs on all of your preferred devices and has a nice user experience.&lt;/p&gt;

&lt;p&gt;That's going to keep your passwords safe and sound...and generate long, gibberish passwords for any new logins.&lt;/p&gt;

&lt;p&gt;Taking things a step further, the manager will actually log you in to those sites and apps when needed.&lt;/p&gt;

&lt;h2&gt;
  
  
  One Password To Rule Them All
&lt;/h2&gt;

&lt;p&gt;To keep all of those passwords in the manager safe and secure, you'll need a password (couldn't avoid them completely 🤣). &lt;/p&gt;

&lt;p&gt;Thankfully, almost all password managers are up to date on the rules and we can use a passphrase here.&lt;/p&gt;

&lt;p&gt;This passphrase is only going to be used with your manager and you should only change it when you think someone might have figured it out or about every year or so.&lt;/p&gt;

&lt;p&gt;Remember, this is the only password you're going to be typing in yourself. Make it a good one!&lt;/p&gt;

&lt;p&gt;Here are some simple guidelines to follow to create a really strong and easy to remember passphrase:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;use a random word generator to select at least 4 (more if you can) truly random words&lt;/li&gt;
&lt;li&gt;throw in a symbol or number (or both) just because&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Boom. Easy to remember, super strong password.&lt;/p&gt;

&lt;p&gt;Something like: &lt;strong&gt;polite2vacuumcensusmonkey!narrowfrozen&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;polite 2 vacuum census monkey ! narrow frozen&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Not only is that a fun passphrase (which I swear was randomly generated) but it's easy to remember and crazy strong.&lt;/p&gt;

&lt;p&gt;Stay safe out there and &lt;a href="https://twitter.com/hashtag/BeCyberSmart"&gt;#BeCyberSmart&lt;/a&gt;!&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
      <category>hacktoberfest</category>
      <category>beginners</category>
    </item>
    <item>
      <title>We're Lacework. We care about security.</title>
      <dc:creator>Tessa Kriesel</dc:creator>
      <pubDate>Thu, 21 Oct 2021 15:35:32 +0000</pubDate>
      <link>https://forem.com/lacework/were-lacework-we-care-about-security-3ijj</link>
      <guid>https://forem.com/lacework/were-lacework-we-care-about-security-3ijj</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2z6h9x3dy5kdgdh56p43.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2z6h9x3dy5kdgdh56p43.gif" alt="Welcome" width="480" height="360"&gt;&lt;/a&gt;&lt;br&gt;
You might be worried that this is another brand trying to get a foothold in a community. It’s not. Of course, that’s what we’d say even if it was, so let’s lay out how we’re going to show you it’s not.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Is Lacework?
&lt;/h2&gt;

&lt;p&gt;We’re a team building out a data-driven security platform specifically aimed to help others teams understand their cloud environments.&lt;/p&gt;

&lt;h3&gt;
  
  
  What Lacework does
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Pulls in a ton of data from what’s happening in your environment&lt;/li&gt;
&lt;li&gt;Throws it through a bunch of enrichment, clean up, and modelling&lt;/li&gt;
&lt;li&gt;Then highlights anomalies, misconfigurations, and other outliers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal is really to give you the context about behaviors in your builds so that you can make informed decisions.&lt;/p&gt;

&lt;p&gt;The platform aims to answer the ‘simple’ (ha!) question of, “This happened, do I need to worry about it?”&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Should You Care?
&lt;/h2&gt;

&lt;p&gt;“This happened, do I need to worry about it?” is a critical question. Mistakes and misconfigurations are the number one problem when it comes to security in the cloud. Sure, there are lots of other “cooler” things happening but they are not nearly as common as those pesky mistakes.&lt;/p&gt;

&lt;p&gt;While we’re building out this platform, we’re learning a ton about how devs like yourself view security and how teams approach those challenges.&lt;/p&gt;

&lt;p&gt;We’re here to help explain the latest challenges around security, why it’s important, and how you can start to think about security-by-design when you’re building.&lt;/p&gt;

&lt;p&gt;If that sounds complicated, it can be but at the end of the day, it’s really just about constantly asking yourself, “What else can this do?”&lt;/p&gt;

&lt;p&gt;Asking yourself that one question goes a very long way to addressing a lot of security concerns.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s Next?
&lt;/h2&gt;

&lt;p&gt;We plan on publishing content here around security best practices, security thinking, current news/issues, and other fun stuff to help you level up your security skill set.&lt;/p&gt;

&lt;p&gt;That goes for everyone. We’re tired of people thinking that all security work is based on some esoteric branch of a long lost mystic art. Security is something we can all think of and it’s critical that we do.&lt;/p&gt;

&lt;p&gt;We’re all building things that people use everyday and then expect those builds to work as expected…and &lt;strong&gt;only&lt;/strong&gt; as expected.&lt;/p&gt;

&lt;p&gt;Our team has a ton of ideas of what to publish here but we’d love to hear what you want to learn about. Let us know in the comments below 👇.&lt;/p&gt;

&lt;p&gt;Thanks for having us in the community,&lt;/p&gt;

&lt;p&gt;The Lacework Team&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a class="mentioned-user" href="https://dev.to/jesswest"&gt;@jesswest&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="mentioned-user" href="https://dev.to/tessak22"&gt;@tessak22&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a class="mentioned-user" href="https://dev.to/marknca"&gt;@marknca&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a class="mentioned-user" href="https://dev.to/acd37"&gt;@acd37&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="mentioned-user" href="https://dev.to/danakn144"&gt;@danakn144&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="mentioned-user" href="https://dev.to/pedigo36"&gt;@pedigo36&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="mentioned-user" href="https://dev.to/jeffthorne"&gt;@jeffthorne&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;and more yet to join us here!&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>devrel</category>
    </item>
    <item>
      <title>OPA @Lacework</title>
      <dc:creator>Jeff Thorne</dc:creator>
      <pubDate>Tue, 17 Aug 2021 22:19:52 +0000</pubDate>
      <link>https://forem.com/lacework/opa-lacework-27e5</link>
      <guid>https://forem.com/lacework/opa-lacework-27e5</guid>
      <description>&lt;p&gt;There is always a ton of innovation and exciting things happening in the Kubernetes community. One of the CNCF projects we are super excited about over here at Lacework is &lt;a href="https://www.openpolicyagent.org/"&gt;Open Policy Agent&lt;/a&gt; which has seen tremendous interest and adoption over the last 18months. If you’re not familiar with OPA it is a unified toolset and framework that can be used for consistent policy decisions across your cloud native stack. In 2020 alone the OPA project had over 35 million downloads and officially became an CNCF graduated project on Feb 4th, 2021. &lt;/p&gt;

&lt;p&gt;What really makes this project special is it’s open governance and that organizations can leverage their existing investment and skillset around policy in many facets of their cloud native stack. Lacework is committed to embracing OPA so that our customers can drive policy decisions in many parts of our platform.&lt;/p&gt;

&lt;p&gt;Where are we starting with our OPA support? No place better than in build. This will allow us to offer an enriched developer experience, deeper insight, software supply chain governance, and flexible decision making prior to application delivery.&lt;/p&gt;

&lt;p&gt;Ok enough of the fancy terms. Let’s get to the nuts and bolts of our current integration efforts. Lacework is currently in the process of launching a k8s security toolkit called Helios named after the greek titan of the sun and guardian of oaths. So how does OPA fit into Helios? One of Helios’ components is a k8s admission webhook that allows for policy decisions to be made at time of deployment through pod interception with OPA and Lacework image assurance.&lt;/p&gt;

&lt;p&gt;Admission webhooks intercept requests to the Kubernetes API server prior to persistence of the object, but after the request is authenticated and authorized. At a high level they offer admission control which governs and enforces how the cluster is used. Let’s take a look at how this works in action as seen in figure 1.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---TbuRGKE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/avrrxvbz1zqk2noutotu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---TbuRGKE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/avrrxvbz1zqk2noutotu.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Figure 1 - High level architecture of k8s admission webhook&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When the application or pod is deployed in step 1 and after the request has been authenticated and authorized it is passed the admission webhook which can be both mutating or validating for processing in step 2. From here the helios webhook will then lookup image assurance scan results with the Lacework platform for the image in step 3. This lookup is performed with the image SHA and if not found an on-demand scan can be initiated. From here in step 4 the scan results json object is sent to an OPA endpoint for a policy decision.&lt;/p&gt;

&lt;p&gt;Then based on the results received from the OPA endpoint the pod or deployment is either allowed to be provisioned or is blocked. This result along with any error message received from the OPA endpoint is passed to the kube API server for processing.&lt;/p&gt;

&lt;p&gt;We can see the results of this in action below in figure 2. The top terminal is an attempt to circumvent an approved organizational CI/CD pipeline and directly deploy application changes from kubectl. The bottom terminal is a tail on the Lacework Helios admission webhook. We can see that the pod deployment has been intercepted while image assurance results are validated against an OPA endpoint. Based on the vulnerability surface in this image the deployment was ultimately blocked from entering this cluster.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--91qX701d--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/msooj0vimqtrf3nrr53y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--91qX701d--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/msooj0vimqtrf3nrr53y.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Figure 2 - Pod interception and OPA validation of scan results&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;These types of checks and best practices can also be integrated at build time through a variety of plugins to well know CI/CD tools. In figure 3 we can see a Jenkins pipeline blocked through an arbitrary policy written in Rego and validated in build against Lacework’s image assurance scanning results. Figure 4 displays a portion of the resulting build artifact.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--IQpkWjks--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mr1gich24koqs0b2i9be.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IQpkWjks--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mr1gich24koqs0b2i9be.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Figure 3 - Custom OPA policy in build driving pipeline decisions&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RuBolUVb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nnyuakw7r5psnuehc0b5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RuBolUVb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nnyuakw7r5psnuehc0b5.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Figure 4 - Resulting build artifact displaying scan decision and policy ID&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;These are just a couple of quick examples demonstrating the power and flexibility of using Open Policy Agent to enforce policy decisions at various stages in your build to deploy pipelines. In this article we covered how Lacework is integrating OPA into our k8s admission controller and CI/CD plugins. Stay tuned for more info on our OPA and other tech initiatives.&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
