Securing Cloud Native Microservices with Role-Based Access Control using Keycloak
Ambassador post by Daniel Oh, Senior Principal Developer Advocate at Red Hat and CNCF Ambassador Since Keycloak joined CNCF as an incubating project back in April 2023, I’ve asked a lot of enterprise Java developers how they can…
Keycloak joins CNCF as an incubating project
The CNCF Technical Oversight Committee (TOC) has voted to accept Keycloak as a CNCF incubating project. Keycloak is an Identity and Access Management (IAM) solution providing centralized authentication and authorization to applications and APIs. It provides a complete,…
Launch of CNCF Japan Chapter “Cloud Native Community Japan”
By Cloud Native Community Japan Today we are thrilled to announce that leaders of the cloud native community in Japan have collaboratively established “Cloud Native Community Japan” as the Japanese Chapter of Cloud Native Computing Foundation (CNCF). CNCF…
6 open source projects to boost your cloud-native API management game
Guest post originally published on Tyk’s blog by Sonja Chevre and Ahmet Soormally We were very excited to be invited as speakers at the Cloud Native Computing Foundation’s KubeCon+CloudNativeCon in Amsterdam this year! Our KubeCon special edition stickers were…
New Gold Member Hitachi Joins the Cloud Native Computing Foundation
Market leader in cloud-enabled transformation doubles down on cloud native investment AMSTERDAM, The Netherlands – KubeCon + CloudNativeCon Europe – April 17, 2023 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software,…
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker…
Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these…
How to start your cloud security journey
Guest post originally published on InfraCloud’s blog by Frederick Fernando When you start building your cloud infrastructure, security might not be a top priority as much as getting your project up and running. This might lead you to…
Kubernetes RBAC 101: Authentication
Guest post originally published on the Kublr blog by Oleg Chunikhin Leveraging Client Certificates and Bearer Tokens to Authenticate in Kubernetes In part one of this series on Kubernetes RBAC, we introduced authentication and authorization methods. In this article, we’ll dive…