Remove Authentication Remove Linux Remove Open Source Remove Transportation
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

It is important to use security tooling such as OpenSCAP, the open source version of the Security Content Automation Protocol, to harden virtual machine images prior to their deployment in virtual private clouds. These suggestions and others are covered in Linux Academy’s Kubernetes Security Course. Implement RBAC.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. marks the first release of the open source container orchestration platform that is signed using Sigstore (more details here ). Cloud Computing/Cloud Management. Kubernetes 1.24

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. 509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). It provides the basics behind X.509v3

Storage 60
article thumbnail

Learning NVP, Part 4: Adding Hypervisors to NVP

Scott Lowe

I’m assuming that you’ve already gone through the process of getting KVM installed on your Linux host; if you need help with that, a quick Google search should turn up plenty of “how to” articles (it’s basically a sudo apt-get install kvm operation). Create a Transport Zone. Installing OVS. Click Save.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? Secure Socket Layer or SSL and its successor Transport Layer Security or TLS are complex protocols that operate behind the little paddle lock you see on the address bar of your preferred web browser. What I want to know is how that vulnerability was able to persist for so long.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? Secure Socket Layer or SSL and its successor Transport Layer Security or TLS are complex protocols that operate behind the little paddle lock you see on the address bar of your preferred web browser. What I want to know is how that vulnerability was able to persist for so long.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? Secure Socket Layer or SSL and its successor Transport Layer Security or TLS are complex protocols that operate behind the little paddle lock you see on the address bar of your preferred web browser. What I want to know is how that vulnerability was able to persist for so long.