The Otter’s Den
Your go-to hub for Kubernetes security and tech know-how
- Network
Otter this world: How to chart Kubernetes egress traffic with Otterize
Discover how Otterize helps you gain visibility into your egress Kubernetes connections.
- Network
Otter this world: How to chart Kubernetes egress traffic with Otterize
Discover how Otterize helps you gain visibility into your egress Kubernetes connections.
- Zero-trust
BlogMay 13 2024Breaking bad policies: Crafting perfect Istio authorization policies and ingress authentication with Otterize
Learn Istio fundamentals for authorization policies and request authentication, and how Otterize automates application security and zero-trust.
- Kubernetes
BlogApr 29 2024Scheduler vs. API Proxy: Balancing Kubernetes data-plane and control-plane for optimal zero-trust IAM security with Otterize
Discover how to automate zero-trust IAM security for EKS applications and AWS resources using AWS Controllers for Kubernetes (ACK) and Otterize.
- Kubernetes
BlogApr 16 2024First Person Platform Episode 2 - Andrew Moore on Uber Workload Identity and Authorization
The second episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Network Policy
BlogFeb 12 2024Network policies are not the right abstraction (for developers)
We explore the limitations of relying solely on Kubernetes network policies as a solution for achieving zero-trust between pods, identifying multiple flaws that hinder their effectiveness in meeting the demands of real-world use cases, particularly when prioritizing developer experience in a Kubernetes-based platform.
- Kubernetes
BlogJan 24 2024First Person Platform Episode 1 - Andrew Fong on Dropbox Grouper
The first episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Network
BlogJan 20 2024Network mapper, I see you!
Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.
- Amazon
BlogNov 28 2023Otterize launches open-source, declarative PostgreSQL permissions for RDS workloads on AWS EKS clusters
Effortlessly manage database access complexities through the open-source intents-operator and credentials-operator, enabling seamless control of permissions via Kubernetes, ensuring security, and simplifying the entire process with the efficiency of IBAC (intent-based access control).
- Amazon
BlogNov 28 2023Otterize launches open-source, declarative IAM permissions for workloads on AWS EKS clusters
Simplify your AWS IAM role and policy management for Kubernetes ServiceAccounts with the open-source intents-operator and credentials-operator, leveraging the power of IBAC (intents-based access control) to streamline the process and eliminate the tedious manual steps.
- Core
BlogSep 13 2023How to gradually roll out network policies with the new AWS EKS VPC
Learn how Otterize makes it easy to apply zero-trust network policies to one service while being completely certain you aren't affecting any others. Discover how you can do that in a few minutes.