Introducing vCluster.Pro - Optimized for Performance. Ready for Enterprise Scale.
Explore vCluster.Pro
Blog
Go to loft.sh
Featured
By Topic
Access Control
Authentication
CI/CD Pipelines
Collaboration
Community
Comparisons
Cost Optimization
Dashboards
Developer Experience
Development
Enterprise
Git
GitOps
Kubernetes Insights
Monitoring
Multi-Tenancy
Open Source
Platform Engineering
Security
Self-Service
Tools
Tutorials
Use Cases
Video
By Language
By Product
Loft
DevSpace
vcluster
jsPolicy
kiosk
Search
Subscribe
Go to loft.sh
Articles about
security
Mar 22, 2022
•
11
Minute Read
Kubernetes and LDAP: Enterprise Authentication for Kubernetes
Authentication is an important part of functionality across software applications and infrastructures. It allows you to restrict access to users the system recognizes via tokens, username and password pairs, certificates, and other authentication mechanisms.
Mar 2, 2022
•
8
Minute Read
Five Dex Alternatives for Kubernetes Authentication
Authentication helps control access to cluster resources by first verifying a user’s identity. In Kubernetes, the API server needs to verify the identity of every request it receives.
Feb 23, 2022
•
6
Minute Read
Dex for Kubernetes: How Does it Work?
Despite being the most widely used open source container orchestration platform today, Kubernetes does not have the means to create and manage users—at least not natively.
Feb 15, 2022
•
8
Minute Read
10 Essentials for Kubernetes Access Control
Kubernetes, an automated system for managing containerized applications, offers multiple benefits to developers. It eliminates application downtime by creating a new pod automatically when an existing pod crashes, and it allows teams to easily scale applications for traffic increases or decreases.
Feb 7, 2022
•
7
Minute Read
Managing Access to Kubernetes Clusters for Engineering Teams
Kubernetes is a container orchestration tool for managing, deploying, and scaling containerized applications. It helps engineering teams deploy and manage applications across multiple servers with fewer complexities.
Jan 5, 2022
•
7
Minute Read
Kubernetes Policy Enforcement: OPA vs jsPolicy
If you need a policy management tool for your Kubernetes clusters, you have several options to choose from. Two popular policy tools are Open Policy Agent and jsPolicy.
Oct 27, 2021
•
8
Minute Read
Kubernetes RBAC: Basics and Advanced Patterns
Kubernetes RBAC Series Part 1: Introduction to Kubernetes RBAC Part 2: Understanding Kubernetes RBAC Components Part 3: The Complexity of Kubernetes RBAC Part 4: Top Reasons and the Impact of Kubernetes RBAC Complexity Part 5: Best Practices for Simplifying Kubernetes RBAC Kubernetes has modernized how organizations build, test, and deploy their software.
Sep 30, 2021
•
6
Minute Read
Multi-Tenant Kubernetes Clusters: Challenges and Useful Tooling
Multi-tenancy in Kubernetes can seem like an appealing solution to many problems. Maybe it’s to give your developers their own space and save costs by doing it inside a single cluster.
Sep 21, 2021
•
1
Minute Read
Hands-on Introduction to jsPolicy with Rawkode
Recently I had the chance to appear on another episode of Rawkode Live with Loft Labs CEO Lukas Gentele, talking about jsPolicy. If you’re not familiar with it, jsPolicy is a policy framework for Kubernetes that allows you to write policies using JavaScript or TypeScript.
Sep 20, 2021
•
8
Minute Read
Kubernetes Admission Controllers: What They Are and Why They Matter
With Kubernetes becoming the gold standard for advanced container orchestration, it’s also become necessary to use extensions that work alongside Kubernetes to provide security and modularity.
Sep 8, 2021
•
9
Minute Read
Kubernetes Network Policies: A Practitioner's Guide
Providing security for our infrastructure and applications is a never-ending continuous process. This article will talk about security in Kubernetes clusters, traffic incoming and outgoing to/from the cluster, and the traffic within the cluster.
Jul 8, 2021
•
9
Minute Read
Kubernetes Network Policies for Isolating Namespaces
Kubernetes is hailed as a modern-day operating system for cloud-native applications. It simplifies application deployment and management for applications running in the cloud. However, when running applications deployed in production, security cannot be overlooked.
Sign up for our newsletter
Be the first to know about new features, announcements and industry insights.
eu1
26230392
15314855-8a4c-4751-ad29-605050b96984
loft-sh
false