Bion Blog: Security

Having More Secure AWS Environments with AWS Security Hub - Part 1

How secure do you think your cloud environment is? According to the 2021 Cloud Security Report by ...

Confidential Nodes and Computing in GKE

Do you feel like a spy?

No worries, you’re in a good place to explore Confidential Computing and...

Amazon EKS: IAM Roles for Service Accounts (IRSA)

In Kubernetes, Role-Based Access Control is a key method for making your cluster secure. If you are...

Kubernetes Network Policies - Part 2

In this blog post, we will continue to explain how network policies work and show how they can...

Kubernetes Security - CIS Benchmarks - Part 2

This is the second part of the CIS Benchmarks blog post series. If you are new to CIS Benchmarks,...

Kubernetes Security - CIS Benchmarks - Part 1

Kubernetes clusters can be very secure, but the default configuration is not safe at all. You have...

Kubernetes Network Policies - Part 1

Kubernetes is not secure out of the box, and we can apply additional configurations to achieve a...