Search results for: security audit


Local Env as Code: Is it possible yet

Posted on June 2, 2022 | Jan Van Bruggen

Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon…


Kubernetes Annual Report 2021

Posted on June 1, 2022

This is a summary of the Kubernetes project’s contributor community and activities. This report documents both quantitative measures of community health (project milestones and snapshot) as well as qualitative measures of the community as reported by…


SSH bastions break your zero trust model

Posted on May 27, 2022 | Michael Shieh

Guest post originally published on the Appaegis blog by Michael Shieh It’s a common practice to set up a bastion server to provide access to the host and then use that as the gateway for SSH…


5 tips for implementing an Internal Developer Portal in your company

Posted on May 13, 2022 | Mia-Platform Team

Guest post originally published on Mia-Platform’s blog by Mia-Platform Team More and more companies are adopting the Agile approach and DevOps paradigm to accelerate and improve their software development. Even though some software lifecycle processes have been simplified and speeded…


How to secure deployments in Kubernetes?

Posted on May 2, 2022 | Leonid Sandler

Guest post originally published on ARMO’s blog by Leonid Sandler CTO & Co-founder at Armo Security is crucial ‌for containerized applications that run on a shared infrastructure. With more and more organizations moving their container workloads…


Twelve-factor app anno 2022

Posted on April 28, 2022 | Anders Qvist

Guest post originally published on Xenit’s blog by Anders Qvist The Twelve-factor app is a methodology for building software-as-a-service apps that was first formulated by developers associated with Heroku. It’s been ten years since the first presentation…


ZTNA is dead. Long live zero trust.

Posted on April 20, 2022 | Michael Shieh

Guest post originally published on Appaegis’s blog by Michael Shieh, Co-founder and CEO of Appaegis Why Enterprises Should adopt a Zero Trust Architecture  Zero Trust was a concept coined by John Kindervag at Forrester in 2009….


The grype admission controller

Posted on April 14, 2022 | Josh Knarr

Guest post originally published on the BoxBoat blog by Josh Knarr Intro Today I want to write about the grype admission controller. I wrote it. I am proud of it. I think it solves a really uncomfortable…


Leveraging Kubernetes to run databases, message queues and in-memory caches: How we built a truly portable platform

Posted on March 23, 2022

Guest post originally published on the Elastisys blog by the Elastisys team We increasingly meet CTOs and cloud architects in need of a secure platform that can run on multiple clouds or on-premise to meet customer…


NSA & CISA Kubernetes hardening guide – what is new with version 1.1

Posted on March 18, 2022

Guest post originally published on ARMO’s blog by Leonid Sandler, CTO & Co-founder, ARMO In March 2022, NSA & CISA has issued a new version of the Kubernetes Hardening Guide – version 1.1. It updates the previous version that…