Found 219 bookmarks
Newest
How to setup a multi-tenant cluster with GKE - Cloud Solutions
How to setup a multi-tenant cluster with GKE - Cloud Solutions
One of the best practices around development environment is to have one large Kubernetes cluster in a multi-tenant mode for your developers. This brings in cost saving specially when you have many small teams divided along the lines of microservices. Before we dive into understanding how we can setup a cluster in a multi-tenant mode, […]
How to setup a multi-tenant cluster with GKE - Cloud Solutions
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Docker has revolutionized the way we package and deploy software to the cloud. However, when it comes to securing our applications, we have many of the same old challenges. How do we know the software we’re running is secure? When new vulnerabilities come up, how can we roll out fixes quickly, and without service interruptions? In this talk we’ll talk about Google’s approach to securing your build pipeline, detecting vulnerabilities in production, and, of course, methods to prevent vulnerabilities from ever getting there. SEC208 Event schedule → http://g.co/next18 Watch more Security sessions here → http://bit.ly/2zJTZml Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub re_ty: Publish; product: Cloud - General; fullname: Justin Beckwith; event: Google Cloud Next 2018;
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
The Art of Crafting Architectural Diagrams
The Art of Crafting Architectural Diagrams
Architectural diagrams can be useful tools for documenting and communicating the design of a system. They must be self descriptive, consistent, accurate enough and connected to the code. Applying some guidelines can ensure the diagrams are useful to a variety of stakeholders.
The Art of Crafting Architectural Diagrams
Latacora - The SOC2 Starting Seven
Latacora - The SOC2 Starting Seven
So, you plan to sell your startup’s product to big companies one day. Congratu-dolences! Really, that’s probably the only reason you should care about this article. If that’s not you, go forth and live your life! We’ll ask no more of your time. For the rest of you: Industry people talk about SOC2 a lot, and it’s taken on a quasi-mystical status, not least because it’s the product of the quasi-mystical accounting industry.
Latacora - The SOC2 Starting Seven
11 Ways (Not) to Get Hacked - Kubernetes
11 Ways (Not) to Get Hacked - Kubernetes
Author: Andrew Martin (ControlPlane) Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishing with a projection into the future of security, here is a list of handy tips to help harden your clusters and increase their resilience if compromised. Part One: The Control Plane 1. TLS Everywhere 2. Enable RBAC with Least Privilege, Disable ABAC, and Monitor Logs 3.
11 Ways (Not) to Get Hacked - Kubernetes
Kubernetes Network Policies - A Detailed Security Guide | StackRox
Kubernetes Network Policies - A Detailed Security Guide | StackRox
The container orchestrator war is over, and Kubernetes has won. With companies large and small rapidly adopting the platform, security has emerged as an important concern – partly because of the learning curve inherent in understanding any new infrastructure, and partly because of recently announced vulnerabilities.
Kubernetes Network Policies - A Detailed Security Guide | StackRox
Securing a Cluster - Kubernetes
Securing a Cluster - Kubernetes
This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
Securing a Cluster - Kubernetes