Learning Center
API Gateway (1)
What Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardEnvoy Gateway (6)
How To Secure Kubernetes
Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…
Read more arrow_forwardKubernetes Ingress Security Best Practices
Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…
Read more arrow_forwardWhat Is a Kubernetes Ingress Gateway?
A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…
Read more arrow_forwardWhat Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardWhat Is Envoy Gateway?
Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…
Read more arrow_forwardWhat Is the Kubernetes Gateway API?
Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…
Read more arrow_forwardEnvoy Proxy (2)
Envoy Proxy
What does Envoy mean? Envoy is a high-performance, open-source proxy server designed for cloud-native applications. It is often used in conjunction with service mesh platforms like Istio to provide advanced…
Read more arrow_forwardHow To Secure Kubernetes
Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…
Read more arrow_forwardFIPS (3)
FIPS FedRAMP
FIPS (Federal Information Processing Standards) and FedRAMP (Federal Risk and Authorization Management Program) are two distinct but related sets of standards and regulations established by the U.S. government to ensure…
Read more arrow_forwardIstio FIPS
Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…
Read more arrow_forwardWhat Is FIPS?
The Federal Information Processing Standard (FIPS) is a set of standards for information processing systems that all U.S. federal agencies, contractors, and vendors must adhere to. FIPS standards cover a…
Read more arrow_forwardIstio Service Mesh (1)
Istio FIPS
Istio FIPS refers to the support for Federal Information Processing Standards (FIPS) compliance within the Istio service mesh. Istio is an open source service mesh platform used for managing and…
Read more arrow_forwardKubernetes (6)
How To Secure Kubernetes
Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…
Read more arrow_forwardKubernetes Security Best Practices
Kubernetes has become a core component of modern application deployment by delivering flexibility, scalability, and efficiency for managing containerized applications. This article delves into Kubernetes security best practices to guide…
Read more arrow_forwardKubernetes Traffic Routing and Control
Kubernetes is the go-to choice for deploying containerized applications, but managing traffic within and between services is crucial for optimal performance. Kubernetes traffic routing encompasses how requests move between different…
Read more arrow_forwardNGINX as a Kubernetes Ingress Controller
Background NGINX is a high-performance web server, reverse proxy server, and load balancer. Developed by Igor Sysoev and first released in 2004, NGINX is known for its efficiency in handling…
Read more arrow_forwardWhat Does Kubernetes Do?
Containerization Kubernetes has become essential to modern application deployments by providing flexibility, scalability, and efficiency when managing containerized applications. Containerization is a popular method for packaging applications for deployment. Software…
Read more arrow_forwardWhat Is a Kubernetes Ingress Gateway?
A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…
Read more arrow_forwardKubernetes Gateway API (4)
What Is a Kubernetes Ingress Gateway?
A Kubernetes Ingress Gateway is an implementation of the Kubernetes Gateway API. The Gateway API is a successor of the Kubernetes Ingress API. It serves as an entry point for…
Read more arrow_forwardWhat Is an API Gateway?
Overview Application Programming Interfaces (APIs) are essential building blocks of modern software applications. APIs provide a standard way for different applications to communicate and exchange data with each other. However,…
Read more arrow_forwardWhat Is Envoy Gateway?
Overview Envoy Gateway is an open source project that aims to make it simple to use Envoy Proxy as an API gateway by delivering a simplified deployment model and API…
Read more arrow_forwardWhat Is the Kubernetes Gateway API?
Overview The Kubernetes Gateway API, aka “Gateway API,” is a Kubernetes API specification defining a standard way to configure and manage application traffic routing in Kubernetes clusters. It is managed…
Read more arrow_forwardKubernetes Ingress (1)
NGINX as a Kubernetes Ingress Controller
Background NGINX is a high-performance web server, reverse proxy server, and load balancer. Developed by Igor Sysoev and first released in 2004, NGINX is known for its efficiency in handling…
Read more arrow_forwardMutual TLS (mTLS) (3)
How To Secure Kubernetes
Kubernetes is now the leading orchestration platform for deploying and managing containerized applications. However, the distributed nature of Kubernetes environments also introduces security challenges. In this article, we’ll look at…
Read more arrow_forwardKubernetes Ingress Security Best Practices
Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…
Read more arrow_forwardWhat Is mTLS?
Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…
Read more arrow_forwardObservability (1)
What Is Observability?
Overview Observability refers to the ability to gain insight into the internal state of a system by observing its external behavior. In other words, it’s the ability to understand what’s…
Read more arrow_forwardPlatform Team (1)
What Is a Platform Team?
Overview A platform team is responsible for creating and maintaining the underlying platform that supports the development, deployment and operations of software applications. The platform team provides critical infrastructure, tools…
Read more arrow_forwardWasm (1)
What Is Wasm?
WebAssembly (abbreviated as Wasm) is a low-level bytecode format designed as a portable target for the compilation of high-level languages like C, C++, and Rust, enabling deployment on the web…
Read more arrow_forwardZero Trust (5)
Kubernetes Ingress Security Best Practices
Securing Kubernetes Ingress resources is crucial to protect your applications and data from unauthorized access, attacks, and other security risks. Ingress Controller Best Practices: To learn more about how to…
Read more arrow_forwardNIST Zero Trust Architecture
NIST Zero Trust Architecture refers to cybersecurity policies and best practices developed by the National Institute of Standards and Technology (NIST). In the Special Publication 800-207 and 800-207A series, NIST…
Read more arrow_forwardWhat Is mTLS?
Mutual TLS (mTLS) is a variation on transport layer security (TLS). Traditional TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for secure…
Read more arrow_forwardWhat Is Zero Trust Security?
Overview Zero Trust Security—sometimes called Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA)—is an information security model that requires strict identity verification for all users, devices, and applications…
Read more arrow_forwardZero Trust Architecture
Don’t trust. Verify. That’s the philosophy behind Zero Trust Architecture (ZTA). Legacy network security architecture is no longer sufficient when it comes to ensuring the highest levels of cybersecurity and…
Read more arrow_forward