Company
Date Published
Author
Anna Liu
Word count
3383
Language
English
Hacker News points
None

Summary

Twingate is introducing a new capability called Kubernetes Access, which takes security beyond the network perimeter and into clusters themselves. This evolution of the Twingate platform provides richer access controls into Kubernetes, following zero trust principles from initial connection to specific cluster operations. The new capability allows for one authentication step instead of two, eliminates credential sprawl and associated security risks, and provides comprehensive session recording and logs available in ASCII NEMA format. It also means that users can go beyond simple identity verification and extend Twingate's robust Security Policies all the way through to clusters themselves. The new capability builds upon the existing Twingate Kubernetes Operator and is designed to provide a modern Zero Trust network that is more secure and maintainable than VPNs.