Dell acquired the cybersecurity software company when it bought EMC in 2016. Since then it has...
Juniper CTO Bikash Koley calls it quits; Larry Ellison says Oracle will not replace Hurd; plus the...
“Security is one of the biggest factors limiting IoT expansion,” said Bill Curtis, resident...
Amazon claims to have bolstered its FedRAMP compliance by nearly 18% since the beginning of...
Aviatrix CEO: SD-WAN is dead. AWS killed it; Fortinet leapfrogs Cisco with 21,000 SD-WAN customers;...
The vendor used its clout over the past 12 months in continuing to bolster its position across...
The virtual tour will, however, require users to sign up for a 30-day trial of Juniper's Contrail...
Aviatrix's CEO claimed SD-WAN is dead and that AWS killed it; VMware's CEO taunted IBM for paying...
Grab your tinfoil hat and a champagne cocktail, snuggle up in front of a warm fireplace, and check...
Aviatrix CEO Steve Mullaney raised eyebrows earlier this month when he predicted the demise of the...
Huawei struck back at a report claiming the Chinese vendor benefitted from government subsidies...
Broadcom paid $10.7B for Symantec; Cisco bought Acacia Communications for $2.6B; plus 2019's...
JR Rivers left Cumulus Networks for AWS; Nutanix’s Sunil Potti joined Google; plus 2019's biggest...
The past year was highlighted by ongoing security and commercialization challenges around business...
The bug was initially spotted by Cisco in June 2018 and given a “critical” rating.
SDxCentral Weekly Wrap for Dec. 30, 2019: The SD-WAN space has become a numbers game; Google Cloud...
Shape boasts that it protects more accounts from fraud than everyone else combined. Its customers...
“How do I enable GitOps for my network security policies?” This is a common question we hear from security teams. Getting started with Kubernetes is relatively simple, but moving production workloads to Kubernetes requires alignment from all stakeholders – developers, platform engineering, network engineering, and security.
Most security teams already have a high-level security blueprint for their data centers. The challenge is in implementing that in the context of a Kubernetes cluster and workload security. Network policy is a key element of Kubernetes security. Network policy is expressed as a YAML configuration and works very well with GitOps.
We will do a three-part blog series covering GitOps for network security policies. In part one (this part), we cover the overview and getting started with a working example tutorial. In part two, we will extend the tutorial to cover an enterprise-wide decentralized security architecture. In the final part, we will delve into policy assurance with examples.
Note that all policies in Calico Enterprise (network security policy, RBAC, threat detection, logging configuration, etc.) are enforced as YAML configuration files, and can be enforced via a GitOps practice.
By adopting GitOps, security teams benefit in the following ways: