The role of cloud native + security – Recap from RSA Conference 2022
Last week, CNCF participated at RSA Conference in San Francisco. As part of the DevOps Connect: DevSecOps co-located event, our GM Priyanka Sharma gave a keynote with Frederick Kautz. In their presentation, Priyanka and Frederick discussed…
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities…
Kubernetes ephemeral container security
Guest post originally published on Xenit’s blog by Philip Laine, DevOps Engineer at Xenit Attempting to debug a Pod and realizing that you can’t install curl due to security settings has to be a meme at…
Cloud Native Computing Foundation Welcomes Coinbase as Gold Member
Innovator in the crypto economy affirms commitment to cloud native ecosystem VALENCIA, Spain – KubeCon + CloudNativeCon Europe – May 18, 2022 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native…
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities…
A MAP for Kubernetes supply chain security
Guest post originally published on the Nirmata blog by Jim Bugwadia The sharp increase in software supply chain attacks has made securing the build and delivery of software a critical topic. But what does this mean…
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities…
CNCF On-Demand Webinar: How To Build Kubernetes Policies To Ensure Compliance for Databases
Managing resource standardization in Kubernetes is not an easy task! Kubernetes provides an extensible API that enables the creation of custom resources. These resources are often used to deploy and manage applications running in the cluster….
Testing cloud native best practices with the CNF Test Suite
Community post by Joel Hans for CNCF The telecommunications industry is the backbone of today’s increasingly-digital economies, but it faces a difficult new challenge in evolving to meet modern infrastructure practices. How did telecommunications get itself…
Flux Security: Image Provenance
Guest post originally published on Flux’s blog by Daniel Holbach Next up in our blog series about Flux Security is how and why we use signatures for the Flux CLI and all its controller images and…