Search the Community
Showing results for tags 'configuration management'.
-
Security configuration management (SCM) is the process of establishing, maintaining, and monitoring the security configuration of information systems. It involves identifying, assessing, and remediating security risks that arise from misconfigurations. SCM is a critical component of any organization’s security program. It helps to ensure that information systems are configured in a secure manner, and that security configurations are maintained over time... View the full article
-
Homepage WHY ANSIBLE? Working in IT, you're likely doing the same tasks over and over. What if you could solve problems once and then automate your solutions going forward? Ansible is here to help. COMPLEXITY KILLS PRODUCTIVITY Every business is a digital business. Technology is your innovation engine, and delivering your applications faster helps you win. Historically, that required a lot of manual effort and complicated coordination. But today, there is Ansible - the simple, yet powerful IT automation engine that thousands of companies are using to drive complexity out of their environments and accelerate DevOps initiatives. ANSIBLE LOVES THE REPETITIVE WORK YOUR PEOPLE HATE No one likes repetitive tasks. With Ansible, IT admins can begin automating away the drudgery from their daily tasks. Automation frees admins up to focus on efforts that help deliver more value to the business by speeding time to application delivery, and building on a culture of success. Ultimately, Ansible gives teams the one thing they can never get enough of: time. Allowing smart people to focus on smart things. Ansible is a simple automation language that can perfectly describe an IT application infrastructure. It’s easy-to-learn, self-documenting, and doesn’t require a grad-level computer science degree to read. Automation shouldn’t be more complex than the tasks it’s replacing.
-
Misconfiguration caused by human error is one of the leading causes of security incidents, and Kubernetes is no different, with 67% of organizations suffering a serious K8s misconfiguration in the last 12 months¹. While Kubernetes offers many knobs and dials that – when configured properly – harden your K8s infrastructure and workloads, it’s up to you to identify and embed the necessary checks into your DevOps workflows that enforce these configuration best practices. Join us during this webinar for a crash course on Kubernetes configuration management. Attendees will learn how to: Build secure Kubernetes clusters by hardening the control plane and the nodes Reduce risk from unnecessary privileges, improper workload isolation and RBAC, and other security-relevant settings Embrace the ephemeral and immutable nature of Kubernetes to embed security-as-code Leverage Kubernetes-native mechanisms for enforcement and feedback Register today! Date: Thursday, November 5, 2020 Time: 10:00 am PT / 1:00 pm ET Speaker: Chris Porter, Director of Solutions Engineering, StackRox
-
- kubernetes
- k8s
-
(and 1 more)
Tagged with:
-
Forum Statistics
63.7k
Total Topics61.7k
Total Posts