Search results for: security audit


The 16-point checklist for GitOps success

Posted on July 8, 2022

Guest post originally published on the Weaveworks blog For efficient GitOps management in your organization you need a GitOps checklist. Here’s a handy 16 point checklist you and your team can use when getting started. Build better code…


How to secure Kubernetes Pods post-PSPs deprecation

Posted on June 30, 2022 | By Amir Kaushansky

Guest post originally published on the ARMO blog by Amir Kaushansky Kubernetes pods are the basic building blocks of Kubernetes. It’s managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are hosted on…


PNC Bank

Posted on June 13, 2022

Automating compliance to realize continuous delivery Every CI/CD improvement that speeds code to deployment multiplies the effectiveness of a software team. At finance organizations, the quest to develop an efficient, reliable CI/CD pipeline inevitably runs into compliance requirements….


Local Env as Code: Is it possible yet

Posted on June 2, 2022 | By Jan Van Bruggen

Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon perhaps Data…


Kubernetes Annual Report 2021

Posted on June 1, 2022

This is a summary of the Kubernetes project’s contributor community and activities. This report documents both quantitative measures of community health (project milestones and snapshot) as well as qualitative measures of the community as reported by community leaders…


SSH bastions break your zero trust model

Posted on May 27, 2022 | By Michael Shieh

Guest post originally published on the Appaegis blog by Michael Shieh It’s a common practice to set up a bastion server to provide access to the host and then use that as the gateway for SSH connectivity. The…


5 tips for implementing an Internal Developer Portal in your company

Posted on May 13, 2022 | By Mia-Platform Team

Guest post originally published on Mia-Platform’s blog by Mia-Platform Team More and more companies are adopting the Agile approach and DevOps paradigm to accelerate and improve their software development. Even though some software lifecycle processes have been simplified and speeded up, companies…


How to secure deployments in Kubernetes?

Posted on May 2, 2022 | By Leonid Sandler

Guest post originally published on ARMO’s blog by Leonid Sandler CTO & Co-founder at Armo Security is crucial ‌for containerized applications that run on a shared infrastructure. With more and more organizations moving their container workloads to Kubernetes, K8s…


Twelve-factor app anno 2022

Posted on April 28, 2022 | By Anders Qvist

Guest post originally published on Xenit’s blog by Anders Qvist The Twelve-factor app is a methodology for building software-as-a-service apps that was first formulated by developers associated with Heroku. It’s been ten years since the first presentation of this…


ZTNA is dead. Long live zero trust.

Posted on April 20, 2022 | By Michael Shieh

Guest post originally published on Appaegis’s blog by Michael Shieh, Co-founder and CEO of Appaegis Why Enterprises Should adopt a Zero Trust Architecture  Zero Trust was a concept coined by John Kindervag at Forrester in 2009. As cyberattacks…