Micro-segmentation is an emerging practice that is quickly becoming a critical facet of cloud security. Its objective is not only to prevent compromise, but also to deal with what happens after compromise occurs. The purpose of micro-segmentation is to isolate applications and services from one another in order to prevent attackers from achieving their goals—even if they succeed in initially breaching the organization’s IT defenses.
“For most organizations, we believe serverless PaaS adoption is a matter of when, not if — with enterprise adoption rates exceeding 90% by 2021... However, as with the adoption of VMs and containers, support for securing serverless will initially have visibility and control gaps...Further, new types of attacks will emerge against serverless PaaS, requiring new approaches and techniques.” 1
Deploying workloads in cloud environments comes with many benefits for businesses in terms of time to market, scalability, cost reduction and ease of use.
So, you’ve got your Kubernetes cluster up and running, and now its time to expose workloads to the outside world in a secure fashion.
Trifecta: a variation of the perfecta in which a bettor wins by selecting the first three finishers of a race in the correct order of finish source
This is the third post in a series focused on cloud security fundamentals.
The post is part two of a blog series on cloud security basics and fundamentals. In this instalment, cloud network management and security are addressed.
There is a great plugin out there that helps connecting Jenkins to your Bitbucket account called Bitbucket Branch Source Plugin.
This plugin comes really handy especially if your project has multiple branches. In Jenkins lingo “Multibranch Project”.
The post is part of three-part blog series on cloud security basics and fundamentals. In this installment, cloud security and the shared responsibility model are addressed.
Security is critical to any organization. In the tech world, security can be defined as a set of controls and policies that protect and secure applications, data, and the technological infrastructures they operate on.