Tagged articles
7 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Apr 14, 2026 · Information Security

How to Investigate and Respond to Kubernetes Cluster Intrusions

This guide walks through practical techniques for detecting, tracing, and remediating Kubernetes cluster compromises, covering pod‑level debugging, node inspection, audit‑log analysis, and common attacker behaviors such as privileged pod creation and hostPath mounting.

Cluster ForensicsKubernetesPod Debugging
0 likes · 7 min read
How to Investigate and Respond to Kubernetes Cluster Intrusions
AI Open-Source Efficiency Guide
AI Open-Source Efficiency Guide
Mar 23, 2026 · Artificial Intelligence

Can OpenClaw’s Broad Permissions Be Tamed? Introducing ClawReins – an Audited AI Agent Guard

The article explains how OpenClaw agents can pose severe security risks when granted root access and presents ClawReins, a watchdog layer that intercepts dangerous actions, requires human approval, logs decisions, runs pre‑execution scans, and integrates ToolShield to provide production‑grade AI safety.

AI securityClawReinsNode.js
0 likes · 17 min read
Can OpenClaw’s Broad Permissions Be Tamed? Introducing ClawReins – an Audited AI Agent Guard
JD Retail Technology
JD Retail Technology
Dec 19, 2024 · Big Data

JD.com Data Governance: Architecture, Key Technologies, and Future Directions

JD.com’s data‑governance framework combines a health‑score‑driven, automated platform that cross‑verifies audit logs, builds full‑link and operator‑level lineage, introduces standard fields, and optimizes resource mixing, task staggering, and cross‑datacenter scheduling, while targeting real‑time AI‑enhanced detection and full automation.

Data GovernanceData LineageJD.com
0 likes · 15 min read
JD.com Data Governance: Architecture, Key Technologies, and Future Directions
ITPUB
ITPUB
Apr 26, 2023 · Information Security

Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls

This article explains how to enable Kubernetes audit logging, analyzes CDK‑based attack behaviors captured in audit logs, provides concrete detection rules for information collection, exploitation, and privilege escalation, and shares practical lessons learned when deploying audit‑driven security in cloud‑native environments.

CDKContainerKubernetes
0 likes · 18 min read
Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls
Alibaba Cloud Native
Alibaba Cloud Native
Feb 20, 2019 · Information Security

How to Leverage Kubernetes Audit Logs for Secure Monitoring and Analysis

This article explains the fundamentals of Kubernetes audit logs, their JSON format, recording stages and levels, and shows how to configure policies, analyze logs, and use Alibaba Cloud's integrated solution to create visual reports, custom alerts, and advanced queries for security monitoring.

Kubernetesaudit logslog analysis
0 likes · 13 min read
How to Leverage Kubernetes Audit Logs for Secure Monitoring and Analysis