# Security

Security hardening, threat mitigation, and compliance patterns for Kubernetes, infrastructure, and applications

## Articles

- [Choosing a Kubernetes Policy Engine: OPA/Gatekeeper vs Kyverno vs Pod Security Admission](https://agent-zone.ai/knowledge/security/choosing-policy-engine/) — Decision framework for selecting the right Kubernetes policy enforcement tool based on policy complexity, mutation needs, language preference, and operational overhead.
- [Choosing a Secret Management Strategy: K8s Secrets vs Vault vs Sealed Secrets vs External Secrets](https://agent-zone.ai/knowledge/security/choosing-secret-management/) — Decision framework for selecting the right secret management approach based on security requirements, operational maturity, GitOps compatibility, and compliance needs.
- [Container Runtime Security Hardening](https://agent-zone.ai/knowledge/security/container-runtime-security/) — Securing container runtimes with seccomp profiles, AppArmor and SELinux policies, read-only root filesystems, capability dropping, Falco for runtime threat detection, and gVisor and Kata Containers for workload isolation.
- [Cross-Border Data Transfer: SCCs, Adequacy Decisions, Transfer Impact Assessments, and Technical Safeguards](https://agent-zone.ai/knowledge/security/cross-border-data-transfer/) — Navigating international data transfers under GDPR and other frameworks — legal mechanisms (SCCs, BCRs, adequacy decisions), transfer impact assessments, and technical safeguards that supplement legal protections.
- [Data Classification and Handling: Labeling, Encryption Tiers, Retention Policies, and DLP Patterns](https://agent-zone.ai/knowledge/security/data-classification-handling/) — Implementing a data classification program from labeling through enforcement — defining sensitivity tiers, mapping encryption and access controls per tier, automating retention and disposal, and preventing data leakage.
- [Data Sovereignty and Residency: Jurisdictional Requirements, GDPR, and Multi-Region Architecture](https://agent-zone.ai/knowledge/security/data-sovereignty-residency/) — Understanding data sovereignty laws and residency requirements across jurisdictions, designing multi-region architectures that comply with GDPR, CCPA, PIPEDA, and national data localization mandates.
- [FIPS 140 Compliance: Validated Cryptography, FIPS-Enabled Runtimes, and Kubernetes Deployment](https://agent-zone.ai/knowledge/security/fips-140-compliance/) — Implementing FIPS 140-2/140-3 compliant cryptography in applications and infrastructure — understanding the standard, using FIPS-validated modules in Go, Python, and Node.js, building FIPS container images, and running FIPS-compliant Kubernetes clusters.
- [gRPC Security: TLS, mTLS, Authentication Interceptors, and Token-Based Access Control](https://agent-zone.ai/knowledge/security/grpc-security/) — Securing gRPC services with TLS encryption, mutual TLS authentication, per-RPC credentials, interceptor-based auth patterns, and integration with Kubernetes service mesh and cert-manager.
- [Implementing Compliance as Code](https://agent-zone.ai/knowledge/security/compliance-as-code/) — Operational sequence for implementing compliance as code — policy frameworks (OPA/Gatekeeper, Kyverno, Checkov), CIS benchmark automation, SOC2/PCI-DSS/HIPAA control mapping, audit trail generation, and continuous compliance monitoring.
- [Infrastructure Security Testing Approaches](https://agent-zone.ai/knowledge/security/infrastructure-pentesting/) — Decision framework for infrastructure security testing: automated scanning with Nessus and OpenVAS, Kubernetes-specific testing with kube-bench and kube-hunter, network scanning, credential testing, and when to use each approach based on compliance requirements and risk.
- [Istio Security: mTLS, Authorization Policies, and Egress Control](https://agent-zone.ai/knowledge/security/istio-security/) — How to use Istio's security features for mutual TLS, fine-grained authorization, JWT validation, and egress traffic control in Kubernetes.
- [Kubernetes Audit Logging: Policies, Backends, and Threat Detection](https://agent-zone.ai/knowledge/security/kubernetes-audit-logging/) — Configuring Kubernetes audit logging to capture security-relevant events, integrating with SIEM systems, and detecting suspicious activity patterns.
- [Network Security Layers](https://agent-zone.ai/knowledge/security/network-security-layers/) — Defense in depth for network security from host firewalls through service mesh mTLS to zero-trust networking in Kubernetes.
- [Pod Security Standards: Admission Control and Secure Pod Configuration](https://agent-zone.ai/knowledge/security/pod-security-standards/) — Implementing Pod Security Standards with Pod Security Admission, writing secure SecurityContext configurations, and using policy engines for custom enforcement.
- [Regulatory Compliance Frameworks: HIPAA, FedRAMP, ITAR, and SOX Technical Controls](https://agent-zone.ai/knowledge/security/regulatory-compliance-frameworks/) — Mapping HIPAA, FedRAMP, ITAR, and SOX requirements to concrete technical controls — encryption, access management, audit logging, and infrastructure design patterns for regulated environments.
- [Secret Management Patterns](https://agent-zone.ai/knowledge/security/secret-management-patterns/) — Practical approaches to managing secrets across application stacks, from environment variables to Vault dynamic credentials.
- [Secure API Design: Authentication, Authorization, Input Validation, and OWASP API Top 10](https://agent-zone.ai/knowledge/security/secure-api-design/) — Building secure APIs from the ground up — authentication schemes (OAuth2, API keys, JWTs), authorization patterns, input validation, rate limiting, and defenses against the OWASP API Security Top 10 risks.
- [Securing Docker-Based Validation Templates](https://agent-zone.ai/knowledge/security/securing-docker-validation-templates/) — Hardening docker-compose templates with non-root execution, read-only filesystems, capability dropping, resource limits, network isolation, and secrets management. Every template Agent Zone publishes must model these patterns because agents will copy them.
- [Securing etcd: Encryption at Rest, TLS, and Access Control](https://agent-zone.ai/knowledge/security/etcd-security/) — How to protect etcd, the critical data store containing all Kubernetes cluster state and secrets, with encryption, TLS, and strict access controls.
- [Securing Kubernetes Ingress: TLS, Rate Limiting, WAF, and Access Control](https://agent-zone.ai/knowledge/security/ingress-security/) — Practical patterns for hardening Kubernetes ingress controllers with TLS enforcement, rate limiting, WAF rules, IP whitelisting, and authentication.
- [Security Compliance and Benchmarks](https://agent-zone.ai/knowledge/security/compliance-and-benchmarks/) — Applying CIS benchmarks, automated scanning tools, and compliance frameworks to Kubernetes and containerized infrastructure.
- [Security Incident Response for Infrastructure](https://agent-zone.ai/knowledge/security/security-incident-response/) — Step-by-step incident response playbook for infrastructure and Kubernetes environments: detection, triage, containment, eradication, recovery, and post-incident review with specific commands for compromised pods, leaked credentials, and unauthorized access.
- [SIEM and Security Log Correlation](https://agent-zone.ai/knowledge/security/siem-log-correlation/) — Reference for SIEM deployment and security log correlation — log sources, correlation rules, detection patterns, MITRE ATT&CK mapping, and open-source and cloud-native SIEM options.
- [Software Bill of Materials and Vulnerability Management](https://agent-zone.ai/knowledge/security/sbom-vulnerability-management/) — SBOM generation with syft and trivy, format comparison between SPDX and CycloneDX, vulnerability scanning workflows, CVE prioritization strategies, remediation tracking, and CI/CD pipeline integration.
- [Software Supply Chain Security](https://agent-zone.ai/knowledge/security/supply-chain-security/) — Securing the software supply chain from source code to deployed container images with SBOMs, signing, provenance, and pipeline hardening.
- [Threat Modeling for Developers: STRIDE, Attack Surfaces, Data Flow Diagrams, and Prioritization](https://agent-zone.ai/knowledge/security/threat-modeling/) — Practical threat modeling that developers can actually use — identifying attack surfaces, building data flow diagrams, applying STRIDE to find threats, scoring risks, and integrating threat modeling into the development workflow.
- [TLS and mTLS Fundamentals: Certificates, Chains of Trust, Mutual Authentication, and Troubleshooting](https://agent-zone.ai/knowledge/security/tls-mtls-fundamentals/) — How TLS and mutual TLS work from the ground up — certificate anatomy, chain of trust validation, configuring mTLS between services, certificate lifecycle management, and diagnosing common TLS failures.
- [Zero Trust Architecture: Principles, Identity-Based Access, Microsegmentation, and Implementation](https://agent-zone.ai/knowledge/security/zero-trust-architecture/) — Implementing zero trust from principles to practice — identity verification on every request, microsegmentation, BeyondCorp patterns, policy enforcement points, and practical steps for moving from perimeter security to zero trust.
- [Certificate Management Deep Dive](https://agent-zone.ai/knowledge/security/certificate-management-deep-dive/) — PKI fundamentals, intermediate CAs, short-lived certificates, and automation with cert-manager, Vault PKI, and SPIFFE/SPIRE.
- [OAuth2 and OIDC for Infrastructure](https://agent-zone.ai/knowledge/security/oauth2-oidc-infrastructure/) — Practical guide to OAuth2 and OIDC for infrastructure authentication using Keycloak, Dex, and OAuth2 Proxy with Kubernetes.
- [Secrets Rotation Patterns](https://agent-zone.ai/knowledge/security/secrets-rotation-patterns/) — Automated secrets rotation strategies including dual-credential patterns, dynamic secrets, and zero-downtime credential updates for databases, APIs, and TLS.
- [Zero Trust Networking](https://agent-zone.ai/knowledge/security/zero-trust-networking/) — Practical guide to zero trust networking with BeyondCorp principles, Tailscale, WireGuard, and Boundary for infrastructure access.


---

[JSON](https://agent-zone.ai/knowledge/security/index.json) | [HTML](https://agent-zone.ai/knowledge/security/?format=html)
