Achieving the NSA Kubernetes Hardening Guidelines with Kyverno
The Kubernetes Hardening Guidance is particularly helpful for developers working on high-level national security systems and applies to various Kubernetes deployments. Here are the key items DevOps specialists should take away from the hardening guide and how Kyverno helps achieve the Kubernetes hardening guidelines. Read the blog here.
A MAP for Kubernetes Supply Chain Security
The sharp increase in software supply chain attacks has made securing the build and delivery of software a critical topic. But what does this mean for Kubernetes DevOps teams tasked with securing their continuous delivery pipelines and clusters? To get started with securing a Kubernetes supply chain there are four things you will need to consider: Artifacts, Metadata, Attestations, and Policies (A-MAP). Read the blog here.
Infrastructure as Code (IaC) Agility and Governance using Nirmata and Crossplane
Most Enterprises want to drive agility by enabling self-service cloud environments for their development teams but they face challenges in ensuring governance and managing costs when self-service is enabled. Additionally, certain developer resources have a dependency on resources that are controlled by the central cloud or platform teams and require privileged access. How do you ensure that these resources are created by the right team as needed to deliver secure self-service environments for the developers? Let's dig in!
Signing and Verifying Images to Secure CICD Pipelines using Sigstore and Kyverno
How can we improve supply chain security signing for my container images, in an open, accessible, and transparent manner? How can we store these signatures in a safe and organized way? And then how can we ensure that no one can deploy in my Kubernetes clusters malicious images that can be a risk to my entire software supply chain? Let's get started in with Roberto Carratalá from Red Hat.