Tag: Optimized OS
-
Cloud Blog: Innovate with Confidential Computing: Attestation, Live Migration on Google Cloud
Source URL: https://cloud.google.com/blog/products/identity-security/innovate-with-confidential-computing-attestation-live-migration-on-google-cloud/ Source: Cloud Blog Title: Innovate with Confidential Computing: Attestation, Live Migration on Google Cloud Feedly Summary: Since its debut on Google Cloud, Confidential Computing has evolved at an incredible pace, offering customers robust protection for sensitive data processed in the cloud and ensuring higher levels of security and privacy. Driven by the…
-
Cloud Blog: How we’re making GKE more transparent with supply-chain attestation and SLSA
Source URL: https://cloud.google.com/blog/products/identity-security/how-were-making-gke-more-secure-with-supply-chain-attestation-and-slsa/ Source: Cloud Blog Title: How we’re making GKE more transparent with supply-chain attestation and SLSA Feedly Summary: What goes into your Kubernetes software? Understanding the origin of the software components you deploy is crucial for mitigating risks and ensuring the trustworthiness of your applications. To do this, you need to know your…
-
Cloud Blog: Using custom Org Policies to enforce the CIS benchmark for GKE
Source URL: https://cloud.google.com/blog/products/identity-security/how-to-use-custom-org-policies-to-enforce-cis-benchmark-for-gke/ Source: Cloud Blog Title: Using custom Org Policies to enforce the CIS benchmark for GKE Feedly Summary: As the adoption of container workloads increases, so does the need to establish and maintain a consistent, strong Kubernetes security posture. Failing to do so can have significant consequences for the risk posture of an…