NSA Kubernetes Hardening Guide: Audit Logging and Threat Detection Overview

Written By: Robert Brennan

Kubernetes Audit Logging and Threat Detection

Enable audit logging

Persist logs to ensure availability, and aggregate logs external to the cluster

Configure logging throughout the environment

Implement a log monitoring and alerting system tailored to the organization

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Fairwinds

Fairwinds — The Kubernetes Enablement Company | Editor of uptime 99