<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Auditing on Pi Stack</title>
    <link>https://www.pistack.xyz/tags/auditing/</link>
    <description>Recent content in Auditing on Pi Stack</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 10 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.pistack.xyz/tags/auditing/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Self-Hosted Kubernetes Security Auditing: Kube-hunter vs Kubeaudit vs Peirates (2026)</title>
      <link>https://www.pistack.xyz/posts/2026-05-10-self-hosted-kubernetes-security-auditing-kube-hunter-kubeaudit-peirates-guide/</link>
      <pubDate>Sun, 10 May 2026 00:00:00 +0000</pubDate>
      <guid>https://www.pistack.xyz/posts/2026-05-10-self-hosted-kubernetes-security-auditing-kube-hunter-kubeaudit-peirates-guide/</guid>
      <description>&lt;p&gt;Kubernetes clusters are complex distributed systems with dozens of potential attack surfaces: misconfigured RBAC, exposed API servers, privileged containers, writable host mounts, and insecure network policies. While compliance scanning and policy enforcement tools catch configuration drift, dedicated security auditing tools actively probe your cluster for vulnerabilities that automated policies miss.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
