Blog


How to security harden Kubernetes in 2022
Member Post How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker...
June 7, 2022 | By Elastisys team

Introduction to the Cloud Native Security Controls Catalog
Community Post Introduction to the Cloud Native Security Controls Catalog
Community post by Jon Zeolla, CTO and Co-Founder of Seiso The CNCF Security Technical Advisory Group (“Security TAG”) has provided a wealth of information to assist organizations in the planning and design of secure cloud native systems, including...
June 7, 2022

Upcoming Code of Conduct updates at CNCF
Upcoming Code of Conduct updates at CNCF
By: Chairs for CNCF Governing Board & Technical Oversight Committee CNCF Community, CNCF is in the process of improving its Code of Conduct (CoC) processes to be more transparent, include community voices and representation, and achieve a balance...
June 6, 2022

OSTIF’s audit of CRI-O is complete – high severity issues found and fixed
Community Post OSTIF’s audit of CRI-O is complete – high severity issues found and fixed
Community post originally published on the OSTIF blog Open Source Technology Improvement Fund is thrilled to report the results of a security audit of CRI-O. CRI-O is an open source software (OSS) project that is an implementation of the Kubernetes Container Runtime Interface. It...
June 6, 2022 | By OSTIF

Ada Logics: CRI-O holistic security audit engagement
Community Post Ada Logics: CRI-O holistic security audit engagement
Community post originally on the Ada Logics blog by David Korczynski, Security Research & Security Engineering and Adam Korczynski, Security Engineering & Security Automation, Ada Logics Ada Logics Ltd. recently performed a holistic security audit of CRI-O. CRI-O is...
June 6, 2022 | By David Korczynski + Adam Korczynski

How to test application security
Member Post How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must...
June 6, 2022 | By Craig Risi

5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Member Post 5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Guest post originally published on Humanitec’s blog by Aeris Stewart, Community Manager at Humanitec Here are 5 things you need to know about implementing Kubernetes, based on Humanitec’s 2022 Kubernetes Benchmarking Study. Knowing your way around a tool...
June 3, 2022 | By Aeris Stewart

Local Env as Code: Is it possible yet
Member Post Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon perhaps Data...
June 2, 2022 | By Jan Van Bruggen

Flux May 2022 update
Project Post Flux May 2022 update
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities which are...
June 2, 2022 | By Daniel Holbach

How we designed the logo of KCD Chennai 2022
Community Post How we designed the logo of KCD Chennai 2022
Community post from the Kubernetes Community Days Chennai team We are proud to present Kubernetes Community Days Chennai (KCD Chennai), a community-organized event supported by the Cloud Native Computing Foundation (CNCF). It gathers adopters and technologists from open...
June 1, 2022