Ensuring Kubernetes Security: A Collaborative Journey for Developers and Operators

Ensuring robust Kubernetes security is a shared responsibility that demands collaboration between developers and operators. By addressing vulnerabilities in container images, restricting additional privileges, and restricting visibility between components, organizations can establish a secure Kubernetes environment. Developers play a crucial role in utilizing vulnerability scans, minimizing components, and implementing authentication measures, while operators enforce policies, perform vulnerability scans, and manage network visibility. Together, they fortify the container ecosystem, protecting applications and critical business assets from potential security breaches. Discover the collaborative journey to Kubernetes security and unlock the full potential of this powerful orchestration platform.

Secure Your Services with Istio: A Step-by-Step Guide to Setting up Istio TLS Connections

Looking to secure the communication between services in your Kubernetes cluster with Istio? In this article, we’ll provide a step-by-step guide on how to establish a Transport Layer Security (TLS) connection with Istio. We’ll cover how to expose TLS on the Istio ingress gateway, consume SSL from Istio, and enforce mutual TLS (mTLS) between different services in the cluster. By following the instructions in this guide, you can ensure secure communication and protect your applications from cyber threats. With Istio, you can easily centralize and externalize security aspects, allowing your applications to focus on their business logic and reducing the workload on your development team.

How To Inject Secrets in Pods To Improve Security with Hashicorp Vault in 5 Minutes

Introduction This article will cover how to inject secrets in Pods using Hashicorp Vault. In previous articles, we covered how to install Hashicorp Vault in Kubernetes, configure and create secrets in Hashicorp, and how tools such as TIBCO BW can retrieve them. Still, today, we are going to go one step ahead. The reason why … Read more

TIBCO BW Hashicorp Vault Configuration: More Powerful and Better Secured in 3 Steps

Introduction This article aims to show the TIBCO BW Hashicorp Vault Configuration to integrate your TIBCO BW application with the secrets stored in Hashicorp Vault, mainly for the externalization and management of password and credentials resources. As you probably know, in the TIBCO BW application, the configuration is stored in Properties at different levels (Module … Read more

Create Secrets in Hashicorp Vault Using 2 Easy Ways

Introduction Create secrets in Hashicorp Vault is one of the most important and relevant things you can do once you have installed Hashicorp Vault on your environment, probably by recovering and getting these secrets from the components they need it. But in today’s article, we will focus on the first part so you can learn … Read more

Hashicorp Vault Installation on Kubernetes: Quick and Simple in 3 Easy Steps

Introduction In this article, we are going to cover the Hashicorp Vault Installation on Kubernetes. Hashicorp Vault has become one of the industry standards when we talk about managing secrets and sensitive data in production environments, and this covers cloud and non-cloud-native deployments. But especially in Kubernetes, this is a critical component. We have already … Read more