DevOps.com: "DevOps Chat: OPA and the CNCF, with Torin Sandall"
The Open Policy Agent (OPA) was accepted for incubation by the Cloud Native Computing Foundation.
DevOps.com: "TOC votes to move OPA into CNCF incubator"
Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept the Open Policy Agent (OPA) as an incubation-level hosted project.
TOC votes to move OPA into CNCF incubator
Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept the Open Policy Agent (OPA) as an incubation-level hosted project. OPA, which entered the CNCF Sandbox in March 2018, is an open…
eWeek: "CNCF expands cloud security capabilities with SPIFFE, OPA projects"
The Cloud Native Computing Foundation (CNCF) announced on March 29 that it is adding the Open Policy Agent (OPA) and the Secure Production Identity Framework for Everyone (SPIFFE) projects to its hosted projects roster. .
Kubernetes governance & the top 5 best practices of K8s deployment
Member post originally published on the Fairwinds blog by Joe Pelletier The widespread adoption of containerized applications has fundamentally changed how organizations develop, deploy, and manage their software infrastructure. Kubernetes is fundamental to this change, because…
Managing API sprawl: the case for standards and consistency in API operations
Guest post by Andrew Stiefel, Manager of Product Marketing for Secure API Connectivity Solutions at NGINX, part of F5 By now, most Platform Ops teams are familiar with API sprawl – shorthand for the compounding challenges…
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses…
Enforce pod security policies in Kubernetes using OPA
Guest post originally published on the Magalix blog by Mohamed Ahmed In this article, we’re going to demonstrate how you can enforce the most fine-grained security policies using OPA. Notice that this article is part of a series…