Search results for: security audit


The grype admission controller

Posted on April 14, 2022 | By Josh Knarr

Guest post originally published on the BoxBoat blog by Josh Knarr Intro Today I want to write about the grype admission controller. I wrote it. I am proud of it. I think it solves a really uncomfortable problem in…


Leveraging Kubernetes to run databases, message queues and in-memory caches: How we built a truly portable platform

Posted on March 23, 2022

Guest post originally published on the Elastisys blog by the Elastisys team We increasingly meet CTOs and cloud architects in need of a secure platform that can run on multiple clouds or on-premise to meet customer requirements. A…


NSA & CISA Kubernetes hardening guide – what is new with version 1.1

Posted on March 18, 2022

Guest post originally published on ARMO’s blog by Leonid Sandler, CTO & Co-founder, ARMO In March 2022, NSA & CISA has issued a new version of the Kubernetes Hardening Guide – version 1.1. It updates the previous version that was released…


68 New Members Join the Cloud Native Computing Foundation

Posted on March 8, 2022

Steady growth sees CNCF hit over 775 members, joining together to enable innovation across industries through open source cloud native technology adoption SAN FRANCISCO, Calif. – March 8, 2022 – The Cloud Native Computing Foundation® (CNCF®), which builds…


You can establish reliable Kubernetes clusters without losing sleep

Posted on March 1, 2022 | By Kendall Miller

Guest post originally published on Fairwinds’ blog by Kendall Miller Full service ownership of Kubernetes, much like the tenets of DevSecOps, is a codifying process whereby all teams maintain complete control over their products and services. From software…


Secrets management: essential when using Kubernetes

Posted on January 25, 2022 | By Sebastiaan Kok

Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these…


Top GitOps tactics to build secure cloud native infrastructure

Posted on January 7, 2022 | By Andrew Zola

Guest post originally published on Magalix’s blog by Andrew Zola GitOps adoption is on the rise, driven by enterprise migration to the cloud. We can attribute its growing popularity to its efficiency in streamlined infrastructure management. As such,…


The Kubernetes’ open source tools to check out in 2022

Posted on December 15, 2021 | By Jonathan Kaftzan

Guest post originally published on ARMO’s blog by Jonathan Kaftzan, VP Marketing & Business Development at ARMO In 2014, Kubernetes surfaced from work at Google and quickly became the de facto standard for container management and orchestration. Despite its silicon…


MITRE ATT&CK Matrix for Kubernetes

Posted on October 19, 2021 | By Rahul Sharma

Guest post originally published on the Magalix blog by Rahul Sharma Overview Last year, CNCF reported an extraordinary 300% increase in Kubernetes adoption from 23% in March 2016 to 92% in July 2020. The data clearly outlines Kubernetes as the…


CNCF On-Demand Webinar: Kong Ingress Controller – Kubernetes Ingress On Steroids

Posted on October 13, 2021

Have you ever find yourself in a situation when all your services are running in Kubernetes, and now you need to expose them to the outside world securely and reliably?Ingress management is an essential part of your configuration…