What we learned (and can share) from passing our SOC 2 Type II audit

  • Compliance
  • SOC 2
  • Tailscale blog

Good news everyone, Tailscale is SOC 2 compliant! Our Type II audit validates that our security controls were effective over the period of time evaluated and that we're actually implementing the policies and procedures we committed to. Continue reading to learn about some of the challenges we faced with our audit, open source tools we'd like to share, and how we think our SOC 2 compliance efforts can be improved.


BeyondCorp is dead, long live BeyondCorp

  • BeyondCorp
  • Infrastructure security

No organization has successfully implemented a fully zero trust architecture. Many proponents of zero trust, including the US government, have ignored devices as a key component of BeyondCorp.


Applying DevSecOps to your software supply chain

  • DevSecOps
  • Supply chain security
  • GitHub blog
  • InfoWorld

Developers often want to do the 'right' thing when it comes to security, but they don't always know what that is. In order to help developers continue to move quickly, while achieving better security outcomes, organizations are turning to DevSecOps. For dependencies your code pulls in as part of your software supply chain, what should you do?


Lightning Q&A: DevSecOps in five with Maya Kaczorowski

  • DevSecOps
  • Supply chain security
  • GitHub blog

Last month, GitHub Supply Chain Security Product Manager Maya Kaczorowski explained what DevSecOps is and security best practices for development teams. We had some follow up questions, so we asked her back for a lightning Q&A—a quick deep dive on why DevSecOps matters for developers, and how to apply it to the developer workflow.


Secure at every step: What is software supply chain security and why does it matter?

  • Supply chain security
  • GitHub blog

Today, open source is everywhere—in almost all proprietary codebases and community projects. For organizations, the question isn't if you are or aren't using open source code. It's what open source code you're using, and how much. If you aren't aware of what's in your software supply chain, an upstream vulnerability in one of your dependencies can affect your application, making you susceptible to a potential compromise. In this post, we'll dig into what the term “software supply chain security” means, why it matters, and how you can help secure your project's supply chain.


Secure at every step: A guide to DevSecOps, shifting left, and GitOps

  • DevSecOps
  • Supply chain security
  • GitHub blog

DevSecOps, shifting left, and GitOps: you've probably heard all of these terms recently, but you might not be sure about what they mean. The reality is that these practices share a lot of the same principles—to reduce the time developers need to spend on security, while achieving better outcomes. And who doesn't want that? Let's clear up some confusion and deconstruct what these terms mean, and how they apply to your security and development teams.


Secure at every step: How GitHub's dependency graph is generated

  • Supply chain security
  • GitHub blog

With the accelerated use of open source, your project likely depends on hundreds of dependencies—203 package dependencies per repository on average, to be exact. How can you actually tell what dependencies your application has? Let's dive in to better understand what dependencies are, how to use the GitHub dependency graph to see their impact on your code, and what you should be doing to maintain them.


Secure at every step: Show your dependencies some love with updates

  • Supply chain security
  • GitHub blog

How many of us have ignored a software update, indefinitely clicking “Remind me later” and never quite getting around to it? Unfortunately, it's pretty common. Delaying dependency version updates doesn't mean the update goes away, unfortunately. If an update doesn't include a security patch, though, is it still okay to delay it? In fact, even when updates don't address known vulnerabilities, regularly updating your dependencies improves your security.


Exploring container security: Announcing the CIS Google Kubernetes Engine Benchmark, with Mark Wolters

  • Container security
  • Google Cloud blog

If you're serious about the security of your Kubernetes operating environment, you need to build on a strong foundation. The Center for Internet Security's (CIS) Kubernetes Benchmark give you just that: a set of Kubernetes security best practices that will help you build an operating environment that meets the approval of both regulators and customers. We've released in conjunction with CIS, a new CIS Google Kubernetes Engine (GKE) Benchmark, available under the CIS Kubernetes Benchmark, which takes the guesswork out of figuring out which CIS Benchmark recommendations you need to implement, and which ones Google Cloud handles as part of the GKE shared responsibility model.


Securing open-source: how Google supports the new Kubernetes bug bounty, with Aaron Small

  • Container security
  • Open source security
  • Google Security blog

At Google, we care deeply about the security of open-source projects, as they're such a critical part of our infrastructure—and indeed everyone's. Today, the Cloud-Native Computing Foundation (CNCF) announced a new bug bounty program for Kubernetes that we helped create and get up and running. Here's a brief overview of the program, other ways we help secure open-source projects and information on how you can get involved.


BeyondProd security: How Google moved from perimeter-based to cloud-native security, with Brandon Baker

  • Infrastructure security
  • Cloud security
  • Google Cloud blog

Google's cloud-native architecture was developed prioritizing security as part of every evolution in our architecture. Today, we're introducing a whitepaper about BeyondProd, which explains the model for how we implement cloud-native security at Google. As many organizations seek to adopt cloud-native architectures, we hope security teams can learn how Google has been securing its own architecture, and simplify their adoption of a similar security model.


Exploring container security: Use your own keys to protect your data on GKE

  • Container security
  • Google Cloud blog

Today, we're releasing two features to help you protect and control your GKE environment and support regulatory requirements: the general availability of GKE application-layer Secrets encryption, so you can protect your Kubernetes Secrets with envelope encryption; and customer-managed encryption keys (CMEK) for GKE persistent disks in beta, giving you more control over encryption of persistent disks.


Kubernetes security audit: What GKE and Anthos users need to know

  • Container security
  • Google Cloud blog

Kubernetes reached an important milestone recently: the publication of its first-ever security audit! Sponsored by the Cloud Native Computing Foundation (CNCF), this security audit reinforces what has been apparent to us for some time now: Kubernetes is a mature open-source project for organizations to use as their infrastructure foundation.


Containing our enthusiasm: All the Kubernetes security news from Google Cloud Next '19, with Anne Bertucio

  • Container security
  • Google Cloud blog

We've been hard at work to make it easier for you to ensure security as you develop, build, deploy, and run containers, with new products and features in Google Kubernetes Engine and across Google Cloud. Here's what we recently announced at Next '19, and how you can use these for your container deployments—so there's less cryptojacking, and more time for whale watching, as it were.


Exploring container security: the shared responsibility model in GKE

  • Container security
  • Google Cloud blog

Security in the cloud is a shared responsibility between the cloud provider and the customer. Google Cloud is committed to doing its part to protect the underlying infrastructure, like encryption at rest by default, and in providing capabilities you can use to protect your workloads, like access controls in Cloud Identity and Access Management (IAM). As newer infrastructure models emerge, though, it's not always easy to figure out what you're responsible for versus what's the responsibility of the provider. In this blog post, we aim to clarify for Google Kubernetes Engine (GKE) what we do and don't do—and where to look for resources to lock down the rest.


Exploring container security: four takeaways from Container Security Summit 2019, with Anne Bertucio

  • Container security
  • Google Cloud blog

Dev, ops, and security teams all want their workloads to be more secure (and make those pesky containers actually “contain”!); the challenge is making those teams more connected to bring container security to everyone. The theme of the 2019 Container Security Summit was just that: “More contained. More secure. More connected.” Here are four topics that led the day at the summit.


Exploring container security: Encrypting Kubernetes secrets with Cloud KMS

  • Container security
  • Google Cloud blog

At Google Cloud, we care deeply about protecting your data. That's why we encrypt data at rest by default, including data in Google Kubernetes Engine (GKE). For Kubernetes secrets—small bits of data your application needs at build or runtime—your threat model might be different, so storage-layer encryption is insufficient. Today, we're excited to announce in beta GKE application-layer secrets encryption, using the same keys you manage in our hosted Cloud Key Management Service (KMS).


Exploring container security: How containers enable passive patching and a better model for supply chain security, with Dan Lorenc

  • Container security
  • Supply chain security
  • Google Cloud blog

Adopting containers and container orchestration tools like Kubernetes can be intimidating to anyone, but if you're on the security team, it can feel like yet another technology that you're now responsible for securing. We talk a lot about how to secure containers and avoid common containers security pitfalls, but did you know that you can use containers to improve your overall security posture?


Exploring container security: This year, it's all about security. Again.

  • Container security
  • Google Cloud blog

Earlier this year at KubeCon in Copenhagen, the message from the community was resoundingly clear: “this year, it's about security”. If Kubernetes was to move into the enterprise, there were real security challenges that needed to be addressed. Six months later, at this week's KubeCon in Seattle, we're happy to report that the community has largely answered that call. In general, Kubernetes has made huge security strides this year, and giant strides on Google Cloud. Let's take a look at what changed this year for Kubernetes security.


Exploring container security: Isolation at different layers of the Kubernetes stack, with Tim Allclair

  • Container security
  • Google Cloud blog

While containers bring great benefits to your development pipeline and provide some resource separation, they were not designed to provide a strong security boundary. With that said, let's take a look at what kind of security isolation containers do provide, and, in the event that it's not enough, where to look for stronger isolation.


Exploring container security: Using Cloud Security Command Center (and five partner tools) to detect and manage an attack, with Andy Chang

  • Container security
  • Google Cloud blog

Today, we're excited to announce that you'll soon be able to manage security alerts for your clusters in Cloud Security Command Center (Cloud SCC), a central place on Google Cloud Platform (GCP) to unify, analyze and view security data across your organization. Further, even though we just announced Cloud SCC a few weeks ago, already five container security companies have integrated their tools with Cloud SCC to help you better secure the containers you're running on Google Kubernetes Engine.


Exploring container security: An overview

  • Container security
  • Google Cloud blog

This is the first in a series of blog posts that will cover container security on Google Cloud Platform (GCP), and how we help you secure your containers running in Google Kubernetes Engine.


New research: How to evolve your security for the cloud

  • Cloud security
  • Google Cloud The Keyword blog

This week, McKinsey released a report titled “Making a secure transition to the public cloud,” the result of interviews with IT security experts at nearly 100 enterprises around the world. Leveraging the expertise of Google Cloud and McKinsey security experts, the research presents a strategic framework for IT security in cloud and hybrid environments, and provides recommendations on how to migrate to the cloud while keeping security top of mind.


How Google protects your data in transit

  • Encryption
  • Google Cloud blog

Protecting your data is of the utmost importance for Google Cloud, and one of the ways we protect customer data is through encryption. We encrypt your data at rest, by default, as well as while it's in transit over the internet from the user to Google Cloud, and then internally when it's moving within Google, for example between data centers. We aim to create trust through transparency, and today, we're releasing a white paper, “Encryption in Transit in Google Cloud,” that describes our approach to protecting data in transit.


Cloud KMS GA, new partners expand encryption options

  • Encryption
  • Google Cloud blog

Cloud Key Management Service (KMS) is now generally available. Cloud KMS makes it even easier for you to encrypt data at scale, manage secrets and protect your data the way you want — both in the cloud and on-premise. Today, we're also announcing a number of partner options for using Customer-Supplied Encryption Keys.