Search results for: security audit


Kubernetes security best practices: definitive guide

Posted on February 14, 2022 | Jonathan Kaftzan

Guest post originally published on ARMO’s blog by Jonathan Kaftzan, VP Marketing & Business Development at ARMO Introduction Kubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and,…


Secure your GitOps flows with Security-as-Code

Posted on January 26, 2022 | Andrew Zola

Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes…


DevSecOps: cybersecurity for cloud native applications

Posted on January 18, 2022 | SparkFabrik Team

Guest post originally published on SparkFabrik’s blog by SparkFabrik Team DevOps makes software delivery faster and more reliable, but leaves security practices to specialists at the end of the cycle. This can create a bottleneck in the…


How to start your cloud security journey

Posted on November 15, 2021 | Frederick Fernando

Guest post originally published on InfraCloud’s blog by Frederick Fernando When you start building your cloud infrastructure, security might not be a top priority as much as getting your project up and running. This might lead…


Cloud Native Security Microsurvey: More than 80% of organizations want to build modern security systems with open source software

Posted on October 12, 2021

With the help of the CNCF Security Technical Advisory Group (TAG), CNCF recently conducted a microsurvey of the community to see how organizations are managing cloud native security.  Overall, the report shows that organizations recognize the…


7 Ways to mitigate your SaaS application security risks

Posted on October 8, 2021

Originally published on the Msys Technologies blog If you’re a SaaS entrepreneur or you’re looking to build a SaaS application, in that case, you may already be aware of the fact that there is a new…


Kubernetes Configuration – Auditing for Enterprise Best Practices Through Open Source Tooling

Posted on December 4, 2020

Kubernetes may be changing the cloud world, but your average ops team still hasn’t gotten comfortable with Kubernetes as a new paradigm. This webinar will talk about the ways your team can go about getting complex…


Announcing the Cloud Native Security White Paper

Posted on November 18, 2020

The CNCF Security Special Interest Group (SIG) has just released a new Cloud Native Security Whitepaper to help educate the community about best practices for securing cloud native deployments. The whitepaper intends to provide organizations and…


K8s audit logging deep dive

Posted on September 24, 2020

Many people know that Kubernetes can report API activity to logging back ends and that auditing is a powerful security tool, but what happens in the real world when you have: Multiple API servers Mutating Admission…


Common Kubernetes config security threats

Posted on August 7, 2020

Guest post originally published on the Fairwinds blog by Joe Pelletier, VP of strategy at Fairwinds Securing workloads in Kubernetes is an important part of overall cluster security. The overall goal should be to ensure that…