Hexa Accepted as CNCF Sandbox Project


Hexa Open Source Project for Multi-Cloud Policy Orchestration Accepted as a CNCF Sandbox Project. Open Source Identity Standard and Policy Orchestration Software Unifies Multi-Cloud Access Policy Management.


“Cloud Identity is extremely fragmented with no clear path for orchestrating policy management across different service provider platforms,” said Gary Rowe, principal consulting analyst, and CEO of TechVision Research. “IDQL represents a major step forward in providing a standards-based approach for cloud-based IAM governance.”


The vision for this new project is to usher in a well-conceived open-source policy orchestration framework that expands the possibilities for businesses, consumers, and software vendors to benefit from the transition to a modern, transparent, and passwordless approach to identity. Read the full article.


Top Picks for you this week

You’re Probably Doing DevSecOps Wrong—By Kymberlee Price

In an ideal state, DevSecOps embeds secure development practices in a hyper-agile, continuous development environment instead of bolting security at the end. However, implementation is rarely that ideal in practice. How can companies transform their DevSec Ops programs to get better outcomes?


DevOps V/S DevSecOps-Understanding the Difference By Gui Alvarenga

DevOps and DevSecOps are two different practices that address different business goals. Knowing when to use each practice, or when to transition from DevOps to DevSecops, can help you improve your company’s software and application development.


Top 8 CI/CD Best Practices for Building Successful Applications By Shiva G

Continuous Delivery (CD) builds on top of Continuous Integration (CI) and automates both builds and the complete software release process. A software release artifact can move and advance through the pipeline with a CI/CD pipeline, starting from the code check-in stage through the builds, tests, and different deployment stages.


Important Events

How to Secure Kubernetes and Secrets Management | September 24, 11:30 AM–12:30 PM IST | Register NOW!

To keep #kubernetes workloads safe, especially in a production environment, you need to address key architectural vulnerabilities and platform dependencies. To keep Kubernetes workloads safe, especially in a production environment, you need to address key architectural vulnerabilities and platform dependencies by implementing security best practices.



In this #webinar, we will focus on the best practices for container-native in terms of security and secret management.


Kubernetes Monitoring, Alerting, and Auditing using DO Marketplace tools|October 29, 11:30 AM–12:30 PM IST | Register NOW




Career Opportunities

Business Development Manager-Cloud Solution Apply Now

RazorOps is looking for a highly talented sales manager to grow our SaaS business.

Kubernetes Developer and Admin Apply Now

RazorOps is looking for highly talented, hands-on Kubernetes developers to help accelerate our growing Professional Services consulting cloud and DevOps practice.

Senior Golang Developer Apply Now

We need a strong, battle-tested Golang developer with experience developing the Kubernetes operator SDK and runtime controller



Sponsored





PS- We are going to release newsletters every week, so don't forget to subscribe and share them with your network. We hope this newsletter has provided valuable information.





Subscribe to our LinkedIn Newsletter

Subscribe


Enjoyed this article? Share it.




Ready to get started?

30 Days Free Trial

Signup Here