Search results for: security audit


Keeping secrets secure on Kubernetes

Posted on October 10, 2023 | John Walsh

Member post originally published on the CyberArk blog by John Walsh Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such as a database password, a…


Kubernetes governance & the top 5 best practices of K8s deployment

Posted on September 25, 2023

Member post originally published on the Fairwinds blog by Joe Pelletier The widespread adoption of containerized applications has fundamentally changed how organizations develop, deploy, and manage their software infrastructure. Kubernetes is fundamental to this change, because…


Harbor Project Journey Report

Posted on September 22, 2023

Introduction Harbor is a self-hosted cloud native registry that stores, scans, and signs content such as container images as well as OCI artifacts, including Helm charts. It extends the open source CNCF Distribution project and adds…


What is Flux CD?

Posted on September 15, 2023

Guest post originally published on Weaveworks’ blog Overview Developed by Weaveworks in 2016, Flux CD is a GitOps continuous delivery tool used to streamline and automate application deployments. It started as a small, internal project; now it’s a CNCF-graduated…


Introducing the Wasm landscape (in English and Chinese)

Posted on September 6, 2023 | Chris Aniszczyk, Vivian Hu. and Michael Yuan

By Chris Aniszczyk, Vivian Hu and Michael Yuan “Containers are the new normal, and WebAssembly is the future.”   — CNCF Annual Survey 2022 key findings. Originally created as a secure sandbox to run compiled C/C++…


From chaos to consistency: a comprehensive approach to maintaining a drift-free infrastructure

Posted on September 6, 2023 | Rohit Raveendran

Guest post originally published on Facets Cloud’s blog by Rohit Raveendran This article delves into the foundational triggers of infrastructure drift, its subsequent implications, and streamlined strategies to ensure a seamless and consistent infrastructure. In today’s…


One-time pass codes for Kyverno

Posted on August 11, 2023

Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention…


Have we reached a point of no return on managing software dependencies?

Posted on August 7, 2023 | Paolo Mainardi

Guest post originally published on Paolo Mainardi’s blog by Paolo Mainardi, Founder and CTO of Sparkfabrik Software Supply Chain security issues are hitting hard the whole OSS ecosystem; not a day goes by without a security incident going into…


10 awesome benefits of artifact management and why you need it

Posted on July 28, 2023

Guest post originally published on the Cloudsmith blog by Lee Skillen All about artifact management, alongside 10 awesome benefits that any good Artifact Management platform will provide, including added security, traceability, and control. Efficiency and organization…


From IP to identity: making cattle out of pets in cloud native

Posted on July 24, 2023

Community post by Bill Mulligan From one bit modifying the next to frontend talking to backend, IT is fundamentally about identity, who is talking to what and what is the outcome of their interaction. This concept…