1 STIG for Containers and Kubernetes

bubblegum dance, alt-country dubstep · 4:08

Listen on 93

Lyrics

[Verse 1]
Docker daemon sleeps with secrets exposed
Configuration files left decomposed
Privileged containers break the golden rule
Root access makes hackers drool
Scan those base images, vulnerabilities hide
Alpine and Ubuntu can't run and hide
CVE numbers climbing like a fever dream
STIG requirements tighter than they seem

[Chorus]
Lock it down, scan it clean
API server fortress machine
RBAC guards at every gate
Encrypt etcd before it's too late
Admission controllers standing firm
Policy engines make attackers squirm
Container fortress walls are high
STIG compliance reaching for the sky

[Verse 2]
Kubernetes API server exposed to the wind
Anonymous access where attacks begin
Certificate rotation keeps the keys fresh
Network policies define the mesh
Service accounts need minimal scope
Bind them tight, don't give them rope
Secrets mounted as volumes encrypted
Runtime security gets strictly scripted

[Chorus]
Lock it down, scan it clean
API server fortress machine
RBAC guards at every gate
Encrypt etcd before it's too late
Admission controllers standing firm
Policy engines make attackers squirm
Container fortress walls are high
STIG compliance reaching for the sky

[Bridge]
OPA Gatekeeper and Kyverno watch
Validating webhooks that never botch
Pod security standards enforced at deploy
Immutable infrastructure hackers can't destroy
Etcd encryption at rest and in motion
Database secrets need devotion

[Verse 3]
Runtime protection with AppArmor shields
SELinux boundaries that never yield
Container escape attempts get blocked
Registry scanning keeps images locked
Admission policies validate each request
Security contexts put limits to the test

[Chorus]
Lock it down, scan it clean
API server fortress machine
RBAC guards at every gate
Encrypt etcd before it's too late
Admission controllers standing firm
Policy engines make attackers squirm
Container fortress walls are high
STIG compliance reaching for the sky

[Outro]
Hardened containers, hardened nodes
STIG requirements crack the codes
Docker Enterprise and K8s secure
Container fortress will endure

← 6 Lab 6 — Ansible STIG Automation | 2 STIG for DevSecOps Pipelines →