Socials
  • 1-234-564-3773
  • [email protected]
Cloud Security OperationsCloud Security Operations
  • Home
  • Services
  • Blog
  • Contact Us

Blog

Cloud Security

Restrict Ingress/Egress Traffic Label Selectors – OPA Gatekeeper NetworkPolicy Guardrail (Part 3 )

In this series of blog posts, we will be looking at using OPA gatekeeper as the admission controller for our Kubernetes cluster. We will be focusing specifically at creating gatekeeper policies for networking inside the Kubernetes cluster. This article assumes Read more…

By Siddharth, 1 week1 week ago
Cloud Security

OPA Gatekeeper Restrict Namespaces for Pod Networking – OPA Gatekeeper NetworkPolicy Guardrail (Part 2 )

In this series of blog posts, we will be looking at deploying OPA gatekeeper as the admission controller for our Kubernetes cluster. We will be focusing specifically on creating gatekeeper policies for implementing Network Policy inside the Kubernetes cluster. This Read more…

By Siddharth, 1 week1 week ago
Cloud Security

Restrict NetworkPolicy Management to Specific Users-OPA Gatekeeper Network Policy Guard rails (Part 1)

In this series of blog posts, we will be looking at deploying OPA gatekeeper as the admission controller for our Kubernetes cluster. We will be focusing specifically on creating gatekeeper Network Policy inside the Kubernetes cluster. If you want to Read more…

By Siddharth, 1 week1 week ago
Cloud Security

A Series of Blog Posts on using OPA Policies & Gatekeeper for Kubernetes Security

Introduction No matter what we own, one thing that we always love to do is to customize it. We do it to either make them look and feel the way we want or to have a better sense of control Read more…

By Setu, 2 weeks1 week ago
Cloud Security

Block “Latest” Image Tag – OPA Gatekeeper CI/CD Guardrail (Part 1)

Introduction In this article, we’ll see how we can block “latest” image tag, that is, denying the use of images with the “latest” tag. Yes! You read it right. But why block the “latest” tag? We’ll see that below. What’s Read more…

By Vishal, 2 weeks6 days ago
Cloud Security

Require Trusted Image Repositories and Hardened Images – OPA Gatekeeper CI/CD Guardrail (Part 2)

Introduction This post is about the policy that we’ll use to restrict the use of images only from trusted repositories and the reason to require trusted image repos in an organization. Why do we need this policy? One reason to Read more…

By Vishal, 2 weeks6 days ago
Cloud Security

Deny Pod Exec Resource – OPA Gatekeeper Pod Security Guardrail (Part 4)

Introduction This is the last post in this series about OPA policies under the category “CI/CD and Secure Configurations”. This is not related to OPA and is quite different from the other articles. We’ll look into a policy to deny Read more…

By Vishal, 2 weeks6 days ago
Cloud Security Tools

Automating Container Security Scanning using AWS CodeBuild and Snyk

Introduction In a usual DevOps pipeline process, the idea of security comes quite late in the process, right before the deployment. Security testing at this point has a major issue. The problem is that in many cases apart from the Read more…

By Vishal, 3 weeks3 weeks ago
Cloud Security

Deny Unauthorized Host Paths – OPA Gatekeeper Pod Security Guardrail (Part 1)

Introduction This series of blog posts is all about OPA policies to have a secure CI/CD and pods configuration. We’ll be looking at the various policies and why we’ll be needing it in our organizations. Open Policy Agent (OPA) is Read more…

By Vishal, 1 month6 days ago
Uncategorized

AWS ReInvent19 – Security Announcements

I didn’t attend any AWS reInvent or reInforce conferences to date, however, I never missed any AWS reInvent Security Announcements !! Even this year I watched the reinvent sessions and keynotes while relaxing at home with some popcorn and drinks Read more…

By Setu, 1 year1 year ago

Posts navigation

Previous 1 2 3 4 Next
Subscribe

Always be the first to know news related to Cloud Security. We will never spam you.

Categories
  • Amazon Web Services
  • Cloud Penetration Testing
  • Cloud Security
  • Cloud Security Tools
  • Cloud Security Tutorial
  • Open Policy Agent
  • Uncategorized
Recent Posts
  • Deny Unauthorized ConfigMap Volumes – OPA Gatekeeper Pod Security Guardrail (Part 3)
  • Deny Host Network – OPA Gatekeeper Pod Security Guardrail (Part 2)
  • Restrict Wildcards in RBACs – OPA Gatekeeper RBAC Guardrail (Part 3)
  • Restrict RBAC Admins – OPA Gatekeeper RBAC Guardrail (Part 2)
  • Restrict Service Account Namespace – OPA Gatekeeper RBAC Guardrail (Part 1)
Hestia | Developed by ThemeIsle