/plushcap/analysis/cloudflare/guest-blog-zero-trust-access-kubernetes

Guest Blog: k8s tunnels with Kudelski Security

What's this blog post about?

Kudelski Security has developed an in-house solution using Cloudflare's Identity-aware Proxy (IAP) to automate secure access for developers to different Kubernetes (K8s) control-plane APIs across multiple cloud environments. The automation tool, called 'k8s-tunnels', saves time and enhances security by enabling developers to surface all the K8s services they have access to in a given cloud environment, authenticate an access request using Cloudflare's Zero Trust rules, and establish a connection to that cluster via Cloudflare's IAP. This approach helps maintain small, micro-segmented environments and supports a Zero Trust security model.

Company
Cloudflare

Date published
Dec. 8, 2021

Author(s)
Romain Aviolat (Guest Blogger)

Word count
1684

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.