Automatically Correlate Identity Context with Real-Time Container Behaviors 

A collage of colorful icons depicting locked items and cubes with crown symbols, set against a light gray background. The design includes icons in blue, orange, purple, green, and outlined cubes in circles, with the upwind logo in the top left corner.

We are excited to announce a new addition to Upwind’s industry-leading container security capabilities, giving you the ability to easily view information about highly privileged identities for every containerized resource in your cloud environment.  The Upwind Cloud Security Platform goes beyond traditional CWPP solutions to leverage runtime insights and correlate them with your most important […]

Understanding Kubernetes Identities Part 2: Escalation Paths

Colorful illustration of six clownfish swimming among purple sea anemones on a blue background with bubbles. The word Upwind is displayed in white text in the top right corner.

In Kubernetes, understanding identity escalation paths is crucial for managing security risks effectively. This blog post delves into defining highly privileged identities and exploring potential privilege escalation paths using highly privileged permissions. Definition of a Highly Privileged Identity in Kubernetes In Kubernetes, a highly privileged identity refers to entities such as users or service accounts […]

Understanding Kubernetes Identities, Part 1

A cartoon clownfish swims through vibrant purple and blue coral in an underwater scene. Several other fish swim in the background, and light beams penetrate the water. The word Upwind is written in the top right corner.

When it comes to Kubernetes, managing identities is pivotal for ensuring secure and efficient cluster operations. These identities can be human users or machines, each requiring specific permissions to perform their tasks. In our latest research, we have explored what Kubernetes identities are, the default identities, the permissions they can have, how to configure these […]

Proactively Protect Your Kubernetes with Upwind’s Non-Human Identity Security

Abstract diagram with interconnected colorful circles and icons, featuring a central blue circle with a persons silhouette. The upwind logo is at the top left corner, and various symbols represent different functions or concepts.

We recently announced the release of Upwind’s Identity Security, designed to provide real-time protection for human and non-human identities with a comprehensive Cloud Identity Entitlement Management (CIEM) offering. In this blog post, we will dive deeper into Upwind’s protection for non-human identities (NHI), which provide machine-to-machine access and authentication within your software environment and cloud […]

Top Ways Upwind Helps DevOps Engineers Monitor APIs & CI/CD

Text in a stylized format reads: upwind Top 20 Features for DevOps Part 2: Monitoring APIs & CI/CD on a white background with grid lines.

This is part two of a two-part blog series on how Upwind helps DevOps teams. You can read part 1 here. The Upwind Cloud Security Platform helps organizations accelerate productivity and empower their Dev, Security, and DevOps teams to innovate within a secure and efficient environment. In our last article on how Upwind helps DevOps […]

Easily Understand & Intelligently Secure Human & Machine Identities

Illustration of two large cargo ships at sea under a clear sky. The ships carry colorful containers with crown symbols. The text Upwind is in the top left corner, and DevOps-Airflow-Role is on the side of the foremost ship.

In the ever changing and complex cloud infrastructure landscape, organizations must not only protect their cloud infrastructure and applications from external threats, but also secure them from internal human and machine identities through the practice of Cloud Identity Entitlement Management (CIEM). Managing identities presents multiple challenges, ranging from the need for thorough auditing and generating compliance […]