{"id":19361,"date":"2024-06-17T11:39:46","date_gmt":"2024-06-17T04:39:46","guid":{"rendered":"https:\/\/gcloudvn.com\/?p=19361"},"modified":"2024-07-31T09:57:25","modified_gmt":"2024-07-31T02:57:25","slug":"how-to-strengthen-supply-chain-security-with-gke-security-posture","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/ban-tin\/how-to-strengthen-supply-chain-security-with-gke-security-posture\/","title":{"rendered":"How to strengthen supply chain security with GKE Security Posture"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">The security of the software supply chain is a complex undertaking for modern enterprises. Securing the software supply chain, particularly build artifacts like container images, is a crucial step in enhancing overall security. To provide built-in, centralized visibility into your applications, Google are introducing software supply chain security insights for your Google Kubernetes Engine workloads in the GKE Security Posture dashboard.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our built-in GKE Security Posture dashboard can provide opinionated guidance to help improve the security posture of your GKE clusters and containerized workloads. It includes insights into vulnerabilities and workload configuration checks. The dashboard also clearly points out which workloads are affected by a security concern and provides actionable guidance to address it.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/how-to-strengthen-supply-chain-security-with-gke-security-posture\/#Bang_dieu_khien_GKE_Security_Posture_minh_bach_hon\" >More transparency with GKE security posture dashboard<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/how-to-strengthen-supply-chain-security-with-gke-security-posture\/#Bat_dau_ngay_hom_nay\" >Get started today<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Bang_dieu_khien_GKE_Security_Posture_minh_bach_hon\"><\/span><b>More transparency with GKE security posture dashboard<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To boost transparency and control over your software supply chain, Google are introducing a new \u201cSupply Chain\u201d card within the GKE Security posture dashboard. Now available in public preview, this poGooglerful feature allows you to visualize potential supply chain risks associated with your GKE workloads.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this initial launch Google provide two key insights:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Outdated images: Identify all images that have not updated in the last 30 days, potentially exposing you to recent vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cLatest\u201d tag usage: Gain clarity on images still using generic \u201clatest\u201d tag, hindering precise version control and traceability.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Our Binary Authorization service scans your images running in GKE clusters. You can view a summary of concerns on the \u201cSupply Chain\u201d card and drill down for further details in the \u201cConcerns\u201d tab within the GKE Security Posture dashboard.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow these steps to view the supply chain concerns:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Navigate to the GKE Security Posture page in the Google Cloud console. Note: You need to enable Security Posture if you haven\u2019t already done so.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">On the \u201cSupply Chain\u201d card, click \u201cEnable Binary Authorization API\u201d and then click on \u201cEnable\u201d.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">On the next pop-up titled \u201cSupply Chain\u201d and click \u201cEnable\u201d.<\/span><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19362\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01.png\" alt=\"\" width=\"2078\" height=\"992\" srcset=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01.png 2078w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01-768x367.png 768w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01-1536x733.png 1536w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01-2048x978.png 2048w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-17-at-10.29.01-18x9.png 18w\" sizes=\"auto, (max-width: 2078px) 100vw, 2078px\" \/><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Concerns related to \u201cimage freshness\u201d or \u201clatest tag\u201d will appear in the \u201cSupply Chain\u201d card within 15 mins.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Click on a concern to view the details, \u201cAffected Workloads\u201d tab will show a list of workloads affected by the selected concern.<\/span><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Bat_dau_ngay_hom_nay\"><\/span><b>Get started today<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">This initial release to address supply chain concerns in GKE Security Posture is part of our ongoing commitment to enhancing workload security. In the coming months, Google plan to introduce more sophisticated supply chain concerns that can be scanned by Binary Authorization and displayed in GKE Security Posture, further bolstering the protection and adding transparency for your application and workloads.<\/span><\/p>\n<p style=\"text-align: right;\"><strong>Source: Gimasys<\/strong><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_message_box vc_message_box-standard vc_message_box-rounded vc_color-blue\" ><div class=\"vc_message_box-icon\"><i class=\"vc-mono vc-mono-technorati\"><\/i><\/div><p><a href=\"https:\/\/gcloudvn.com\/en\/main-logo-1\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-664\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1.png\" alt=\"\" width=\"221\" height=\"72\" srcset=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1.png 214w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1-18x6.png 18w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1-183x60.png 183w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/a>As a senior partner of Google in Vietnam, Gimasys has more than 10+ years of experience, consulting on implementing digital transformation for 2000+ domestic corporations. Some typical customers Jetstar, Dien Quan Media, Heineken, Jollibee, Vietnam Airline, HSC, SSI...<\/p>\n<p>Gimasys is currently a strategic partner of many major technology companies in the world such as Salesforce, Oracle Netsuite, Tableau, Mulesoft.<\/p>\n<p>Contact Gimasys - Google Cloud Premier Partner for advice on strategic solutions suitable to the specific needs of your business:<\/p>\n<ul>\n<li>Email: gcp@gimasys.com<\/li>\n<li>Hotline: 0974 417 099<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"B\u1ea3o m\u1eadt chu\u1ed7i cung \u1ee9ng ph\u1ea7n m\u1ec1m l\u00e0 m\u1ed9t th\u00e1ch th\u1ee9c ph\u1ee9c t\u1ea1p \u0111\u1ed1i v\u1edbi c\u00e1c doanh nghi\u1ec7p hi\u1ec7n \u0111\u1ea1i. Vi\u1ec7c b\u1ea3o v\u1ec7 chu\u1ed7i cung \u1ee9ng ph\u1ea7n m\u1ec1m, \u0111\u1eb7c bi\u1ec7t l\u00e0 c\u00e1c s\u1ea3n ph\u1ea9m x\u00e2y d\u1ef1ng nh\u01b0 image container, l\u00e0&hellip;","protected":false},"author":2,"featured_media":19369,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[135],"tags":[],"class_list":["post-19361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google-cloud-platform","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/19361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=19361"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/19361\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/19369"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=19361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=19361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=19361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}