Security Tag

Optimizing Ansible Playbooks for Security and Efficiency with Nirmata

Why Ansible is Essential for Modern DevOps In today’s fast-paced software development world, automation is crucial for maintaining speed, consistency, and scalability. Ansible, a powerful automation tool, enables DevOps teams to efficiently manage infrastructure, deploy applications, and orchestrate complex workflows. It’s simple, YAML-based playbooks allow…

0

Towards CVE-Free Images

This blog post was co-authored by Suhas Gumma and Harshit Raj.  Introduction The acronym CVE stands for “Common Vulnerabilities and Exposures,” a publicly known information security vulnerabilities and exposures database. Each entry in the CVE dictionary identifies a unique vulnerability or exposure and includes critical…

0

Mitigating the Latest Kubernetes NGINX Ingress Controller CVEs

Recently, a few new vulnerabilities for Kubernetes Nginx Ingress controllers have made their way across industry channels, showcasing how much of a challenge securely configuring Kubernetes can be. The vulnerabilities, tracked as CVE-2023-5043, CVE-2023-5044 and CVE-2022-4886, were disclosed on October 27, and are listed as…

0

An in-depth look at Kubernetes security and compliance challenges and solutions

Kubernetes has rapidly become the go-to container orchestration platform, powering many modern cloud-native applications. As more organizations adopt Kubernetes, the need for secure and compliant Kubernetes clusters becomes increasingly important. This blog post takes an in-depth look at the security and compliance challenges that organizations…

0

Nirmata Control Hub Empowers Platform Engineering Teams To Deliver Secure and Compliant Kubernetes Governance

Nirmata Control Hub (NCH), powered by the widely adopted open-source CNCF policy engine – Kyverno, enables platform engineering teams to enforce security, compliance, governance, and automation policies across Kubernetes clusters and workloads. At the recent CloudNativeSecurityCon in Seattle, the lack of security policies was discussed…

0