Alcide Blog

Cloud-native Security Provider

Guest Writer: Twain Taylor

Recent Posts

Kubernetes Network Policies Best Practices

Oct 6, 2019 9:19:53 AM / by Guest Writer: Twain Taylor posted in kubernetes, network security, firewall


While a lot of people are calling network policies the Kubernetes equivalent of a firewall, they probably wouldn’t be called network policies if that were really the case. Although network policies are comparable to security features like firewalls, they mostly pertain to rules, and therefore a more accurate comparison would be with “firewall rules” or security groups in the Cloud that are used to manage permissions.

Read More

IAM Role Pod Delegation Checks on AWS Kubernetes Clusters

Sep 16, 2019 9:27:49 AM / by Guest Writer: Twain Taylor posted in AWS, cloud security, kubernetes, microservices, devops, IAM Role


You can never be too safe when it comes to securing your applications. It’s essential that security is a part of the application framework and not just a protective outer layer. Enterprises are swiftly adopting the microservices architecture because of its numerous benefits. However, security still remains a concern. Kubernetes has emerged as the de-facto container orchestration tool. And, on its own, Kubernetes seems to be decent for managing secrets.
**Since we published this blog, AWS Fine-Grained IAM Roles for Service Accounts - read about it here. **

Read More

Kubernetes Vulnerability Scanning

Jul 3, 2019 5:24:24 AM / by Guest Writer: Twain Taylor posted in cloud security, kubernetes, microservices, devops

1 Comment

Read More

Subscribe to Email Updates