Search results for: open policy containers


KubeEdge releases the first Cloud Native Edge Computing Threat Model and Security Protection Analysis paper

Posted on July 27, 2022

Project post by KubeEdge maintainers The security of cloud native edge computing has been of concern to many users. It was difficult for users to perform effective security hardening on their edge systems due to no security threat…


Cilium 1.12 GA: Cilium Service Mesh and other major new features for enterprise Kubernetes

Posted on July 20, 2022

The Cilium project is excited to announce the general availability of Cilium 1.12.  Cilium is well known as the de-facto standard for cloud native networking and security, adopted by companies like Adobe, Bell Canada, and IKEA as well…


The 16-point checklist for GitOps success

Posted on July 8, 2022

Guest post originally published on the Weaveworks blog For efficient GitOps management in your organization you need a GitOps checklist. Here’s a handy 16 point checklist you and your team can use when getting started. Build better code…


How to secure Kubernetes Pods post-PSPs deprecation

Posted on June 30, 2022 | By Amir Kaushansky

Guest post originally published on the ARMO blog by Amir Kaushansky Kubernetes pods are the basic building blocks of Kubernetes. It’s managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are hosted on…


Volcano Releases v1.6.0

Posted on June 17, 2022

Project post by Volcano project maintainers CNCF Volcano 1.6.0 is now available with new features such as elastic job management, dynamic scheduling and rescheduling based on actual resource utilization, and MPI job plugin. Volcano is the  first cloud…


Know your cloud security acronyms: CWPP, CSPM, CIEM and CNAPP

Posted on June 13, 2022

Guest post originally published on the Orca Security blog by Ty Murphy and Sarah Smith Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an alphabet…


How to security harden Kubernetes in 2022

Posted on June 7, 2022 | By Elastisys team

Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker…


Local Env as Code: Is it possible yet

Posted on June 2, 2022 | By Jan Van Bruggen

Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon perhaps Data…


Kubernetes ephemeral container security

Posted on May 24, 2022 | By Philip Laine

Guest post originally published on Xenit’s blog by Philip Laine, DevOps Engineer at Xenit Attempting to debug a Pod and realizing that you can’t install curl due to security settings has to be a meme at this point….


Announcing the Refreshed Cloud Native Security Whitepaper

Posted on May 18, 2022

The CNCF Security Technical Advisory Group (TAG) has just released a refreshed Cloud Native Security Whitepaper v2 to help educate the community about best practices for securing cloud native deployments. The whitepaper intends to provide organizations and their…