• Scaleway Blog
  • Scaleway Elements
  • Scaleway Dedibox
  • Multi-Cloud
  • Corporate
  • Startup
  • Discover Scaleway

security

A collection of 16 posts

security

8 best practices to secure your cloud infrastructure

Security is and will always be a two-way street: it requires effort from both the user and the platform. At Scaleway, your organization account's security remains our top priority. As a result, we

  • Cyril Petel
    Cyril Petel
8 min read
CTOForum

Securing a hyper-scaling CI/CD: ManoMano's story

About Fabien LemarchandFabien is ManoMano's VP of Platform & Security. When ManoMano hyper-scaled, security challenges such as securing a scaling CI/CD became crucial. Fabien and his team shaped a culture within their

  • Hana Khelifa
    Hana Khelifa
3 min read
Kubernetes

K8s security - Episode 7: KAPSLOCKED

Securing a Kubernetes cluster is not an easy task, but it is not more complicated than securing any cloud environment or even dedicated servers.

  • Emmanuelle Demompion
    Emmanuelle Demompion
2 min read
en

5 quick wins to improve the security of your Scaleway account

Cloud security is everyone's business. Scaleway works to implement the most relevant security bricks on a daily basis - in our data centers, on our application stack, and with a set of services

  • Kevin Messy
    Kevin Messy
6 min read
Kubernetes

K8s security - Episode 6: Security Cheat Sheet

As this series of articles is coming to its end, you will find here a security cheat sheet with a simple purpose of listing best practices and advice to protect your production environment when running it on a Kubernetes cluster.

  • Emmanuelle Demompion
    Emmanuelle Demompion
2 min read
Kubernetes

K8s security - Episode 5: Lock your data

In episode 4, we detailed some of the main security issues that are found into software, and it is no surprise that information leakage is one of the most frequent security flaw.

  • Emmanuelle Demompion
    Emmanuelle Demompion
8 min read
Kubernetes

K8s security - Episode 4: Managing third parties

As you secured your Kubernetes cluster, you defined users, roles, and permissions, making it safer one restriction after the other. Along with user accesses, you also need to control what is being authorized by the services you did not create yourself, and that you depend upon: third parties.

  • Emmanuelle Demompion
    Emmanuelle Demompion
7 min read
Kubernetes

K8s security - Episode 3: Security as a coding philosophy

Interactions between software are key to product security. As we are able to isolate components depending on their communication with each other, we can take a step back and think about how we want to design.

  • Emmanuelle Demompion
    Emmanuelle Demompion
6 min read
Kubernetes

K8s security - Episode 2: Secure your K8s cluster at its root

Our goal is not to dissect a k8s cluster but to understand what needs to be secured and, most importantly, how.

  • Emmanuelle Demompion
    Emmanuelle Demompion
9 min read
Kubernetes

K8s security - Episode 1: From the Cloud to your code

In this series of articles, we intend to highlight the best practices that any Kubernetes user can put in place by demystifying Kubernetes clusters architecture and security. We will also provide clear guidelines and basic configurations to apply to your clusters to be safer and more secure.

  • Emmanuelle Demompion
    Emmanuelle Demompion
3 min read
Scaleway

Use a VPN to secure your services and internal data

The use of a VPN is particularly useful with the massive arrival of work from home. Using a VPN allows you to add an additional layer of security to access internal services

  • Louis Moreau
    Louis Moreau
4 min read
Scaleway

Utiliser un VPN pour sécuriser l'accès à vos services et vos données

L’utilisation d’un VPN est particulièrement utile avec l’arrivée massive du télétravail. Il permet en effet d’ajouter une couche de sécurité supplémentaire

  • Louis Moreau
    Louis Moreau
4 min read
security

ZombieLoad, la nouvelle vulnérabilité affectant les équipements Intel

Chers Cloud Riders, Comme vous le savez sans doute, Intel a publié hier de nouvelles vulnérabilités de sécurité susceptibles d’affecter les fournisseurs de services cloud. Résumé de l’impact sur nos infrastructures

  • Sophie Lavergne
    Sophie Lavergne
2 min read
security

ZombieLoad Vulnerabilities Impacting Intel Hardware

Dear Cloud Riders, As you may know, yesterday was the publication of multiple Intel new security vulnerabilities that may affect cloud service providers. Quick summary. Impact on our infrastructures: Dedibox impactedC2 Bare Metal

  • Sophie Lavergne
    Sophie Lavergne
2 min read
Scaleway

Important information about Intel Side Channel Vulnerability L1TF

As you may have read elsewhere in the media, Intel recently published details of a new side-channel attack called L1 terminal fault (L1TF). The L1TF issue only affects hardware capable of simultaneous multithreading

  • Benedikt Rollik
    Benedikt Rollik
1 min read
Scaleway

Strengthening Scaleway Token Security Policy

Introducing Access Keys and Secrets Currently, to authenticate on the Scaleway APIs, you use a token. This token is a value (an UUID precisely) that is typically used in an HTTP header in

  • Maxime Lavandier
    Maxime Lavandier
2 min read
Scaleway Blog - European cloud provider © 2023
Latest Posts Facebook Twitter YouTube
EN FR DE