Tag: Optimized OS
-
Cloud Blog: How we’re making GKE more transparent with supply-chain attestation and SLSA
Source URL: https://cloud.google.com/blog/products/identity-security/how-were-making-gke-more-secure-with-supply-chain-attestation-and-slsa/ Source: Cloud Blog Title: How we’re making GKE more transparent with supply-chain attestation and SLSA Feedly Summary: What goes into your Kubernetes software? Understanding the origin of the software components you deploy is crucial for mitigating risks and ensuring the trustworthiness of your applications. To do this, you need to know your…
-
Cloud Blog: Using custom Org Policies to enforce the CIS benchmark for GKE
Source URL: https://cloud.google.com/blog/products/identity-security/how-to-use-custom-org-policies-to-enforce-cis-benchmark-for-gke/ Source: Cloud Blog Title: Using custom Org Policies to enforce the CIS benchmark for GKE Feedly Summary: As the adoption of container workloads increases, so does the need to establish and maintain a consistent, strong Kubernetes security posture. Failing to do so can have significant consequences for the risk posture of an…