Weaveworks 2022.03 release featuring Magalix PaC | Learn more
Balance innovation and agility with security and compliance
risks using a 3-step process across all cloud infrastructure.
Step up business agility without compromising
security or compliance
Everything you need to become a Kubernetes expert.
Always for free!
Everything you need to know about Magalix
culture and much more
One of the biggest hurdles we’ve seen organizations encounter while trying to adopt a policy-as-code solution is the steep learning curve involved. With your teams already working at peak capacity, learning new languages, implementing new tools, and owning areas that are mission-critical without the right support isn’t something to be taken lightly.
A misconfiguration can give you and your organization a false sense of security, in the most literal sense, causing disruption in reputation and regulatory compliance. Imagine setting a configuration to “false”, instead of true. This can happen for many reasons, but unbeknownst to you, it could be the difference between a secure environment or an exposed one.
We all know some form of IT Security must be implemented. It’s also something you can’t afford to get wrong. If many of us agree with those statements, then why is security always such an afterthought? Integrating security with cloud-native may seem troublesome and difficult, because the truth is, it’s complicated, and many are not yet up to speed.
At Magalix, a core tenet is to onboard and integrate with existing infrastructure as painlessly as possible.
With a single command to connect a Kubernetes Cluster, you can immediately understand your security posture with predefined Policies, and begin resolving security violations in Production within minutes, instead of spending days trying to get a policy engine to run in Development with 0 policies.
The most frequently asked question we get is “How many policies does Magalix offer?” The 2nd most frequent question is “What kind of policies?” The reason these are the two most frequently asked questions is obvious. People are looking for a policy-as-code solution that comes prepackaged with tons of policies, and an easy way to understand the state of each.
Magalix comes shipped with over 100 Policies and Templates. Instead of combing the Internet, adopting, adapting, and testing open source policies to fit your needs, we’ve leveraged testimonials from the Cloud-Native community, experiences from our world-class SRE team, and most importantly feedback from customers like you to build an ever-growing array of useful and interesting policies.
Magalix Policy Management covers the most common security use cases to unique configurations suited for the highly risk-averse. Policy categories and some included Policies are:
Category
|
Policy Ex #1 |
Policy Ex #2 |
1- Networking policies
|
Block usage of specific Ports |
Allow only specific Ingress Hostnames |
2- Container security policies |
Do not run containers as Root |
Block Container PrivilegeEscalation |
3- Storage policies |
Set Persistent Volume sizes |
Set Persistent Volume Reclaim Policies |
4- Role-based access control |
Prevent usages of Wildcards |
RBAC - Block specified Verbs |
5- Supply Chain policies |
Allow only approved container registries |
Do not allow the “latest” tag |
If you need a Policy to check if CPU and Memory resources are defined, we have that. If you need a Policy to allow only a specified range of CPU and Memory resources, we got you covered there too. Quickly find, sort, and apply only the policies that suit your needs.
We write each of our Policies from scratch. Each Policy is then rigorously battled tested in our pre-production and production environments, across multiple public cloud providers giving you the assurance that Policies are doing what they are designed to do. We have multiple CI/CD pipelines for Policy development using the same modern automation tools most of you are already using because we are DevSecOps at heart.
With Magalix, achieving DevSecOps isn’t as difficult as you may have been led to believe. Interested in learning more about how to start resolving violations in minutes? Schedule a demo.
Empower developers to delivery secure and compliant software with trusted application delivery and policy as code. Learn more.
Automate your deployments with continuous application delivery and GitOps. Read this blog to learn more.
This article explains the differences between hybrid and multi-cloud model and how GitOps is an effective way of managing these approaches. Learn more.
Implement the proper governance and operational excellence in your Kubernetes clusters.
Comments and Responses