
Container Signing with AWS Signer
This project for a Fortune 500 company strengthened the security of deployed applications by implementing notarization for container artifacts, that can be used to established a chain of trust.
The customer, a large financial media company, operates a hybrid cloud environment comprised of on-premise data centers and multiple cloud providers. While Google natively supports dynamic short-lived credentials for accessing their GCR repositories within GCP, access from on-premise and other clouds relied on static keys with an onerous rotation process.
Rearc leveraged Cloud Functions and Pub/Sub to integrate external automation workflows in Jenkins with Identity and Access Management in GCP. This solution enables on-demand and scheduled generation of dynamic service account keys for use in on-premise container builds and pull secrets for Kubernetes clusters hosted in any cloud.
Read more about the latest and greatest work Rearc has been up to.
This project for a Fortune 500 company strengthened the security of deployed applications by implementing notarization for container artifacts, that can be used to established a chain of trust.
This project for a Fortune 500 company strengthened the security of deployed applications by implementing automated cryptographic cipher scanning, analysis, and reporting, ensuring security compliance while maintaining development velocity.
Rearc performed an application portfolio assessment and designed a migration strategy for Avesis as they moved to a new AWS Organization. Post planning, Rearc leveraged infrastructure as code to deliver a new cloud landing zone in AWS and created an account factory for future growth. Rearc integrated Avesis's new AWS environment with their new Azure environment.
This project for a Fortune 500 company strengthened the security of Databricks-integrated data lake pipelines by implementing automated vulnerability detection, secure credential management, and third-party dependency scanning, resulting in a compliant and resilient infrastructure.
Tell us more about your custom needs.
We’ll get back to you, really fast
Kick-off meeting