How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker…
Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these…
How to start your cloud security journey
Guest post originally published on InfraCloud’s blog by Frederick Fernando When you start building your cloud infrastructure, security might not be a top priority as much as getting your project up and running. This might lead you to…
Kubernetes RBAC 101: Authentication
Guest post originally published on the Kublr blog by Oleg Chunikhin Leveraging Client Certificates and Bearer Tokens to Authenticate in Kubernetes In part one of this series on Kubernetes RBAC, we introduced authentication and authorization methods. In this article, we’ll dive…