Category

Security

container security- cloud native
containerSecurity
July 30, 2020

The Ten Commandments of Container Security

A cybersecurity incident can cause severe damage to the reputation of the organization and competitive disadvantage in the market, the imposition of penalties, and unwanted legal issues by end-users. On…
Read More
KubernetesSecurity
May 26, 2020

Kubernetes Pod Security Policies with Open Policy Agent

Kubernetes is the most popular container orchestration platform in today’s cloud-native ecosystem. Consequently, Kubernetes security is also an area of increased interest and attention. In this blog post, first I…
Read More
Open Policy Agent Microservices Authorization Simplified
Security
February 14, 2020

Open Policy Agent : Microservices Authorization Simplified

With microservices development, I often came across a problem with implementing Authentication and Authorization (A&A). We want a robust and centrally managed authentication and authorization strategy. But, the distributed nature…
Read More
role based access in Kubernetes
KubernetesSecurity
January 6, 2020

How to setup Role based access to Kubernetes Cluster

If you are working on Kubernetes for some time you may have faced a scenario where you have to give some users limited access to your Kubernetes cluster. For example…
Read More
Security
September 17, 2019

Kiam for Pod IAM access in EKS

When it comes to authentication and authorization in AWS, IAM (Identity & Access Management) is a crucial component. If you are utilizing EKS (Elastic Kubernetes Service - managed Kubernetes from…
Read More
Security
November 28, 2018

Container security with Sysdig Falco

Sysdig Falco is an open source behavioral activity monitoring tool for better container security. It can detect anomalous activities occurring on a Linux host as well as inside of a…
Read More