The Ops Community ⚙️

# security

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

1
Comments
9 min read
The 1 Azure Arc Setting You Can't Ignore: config.mode

The 1 Azure Arc Setting You Can't Ignore: config.mode

1
Comments
1 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

2
Comments
11 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments
12 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

1
Comments
10 min read
Hacking Alibaba Cloud's Kubernetes Cluster

Hacking Alibaba Cloud's Kubernetes Cluster

5
Comments 2
14 min read
Announcements from AWS re:Inforce 2024 Keynote

Announcements from AWS re:Inforce 2024 Keynote

2
Comments
6 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

Comments
7 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

1
Comments
6 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

1
Comments
8 min read
AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

1
Comments
5 min read
AWS Elastic Kubernetes Service: RBAC Authorization via AWS IAM and RBAC Groups

AWS Elastic Kubernetes Service: RBAC Authorization via AWS IAM and RBAC Groups

Comments
12 min read
Use IAM Roles Anywhere to reduce the use of IAM keys

Use IAM Roles Anywhere to reduce the use of IAM keys

2
Comments 1
31 min read
Security challenges with SaaS applications

Security challenges with SaaS applications

2
Comments
6 min read
VictoriaMetrics: VMAuth — Proxy, Authentication, and Authorization

VictoriaMetrics: VMAuth — Proxy, Authentication, and Authorization

1
Comments
7 min read
Enterprise-scaled Self-Healing StackSets

Enterprise-scaled Self-Healing StackSets

2
Comments
7 min read
MSP Cybersecurity: What You Should Know

MSP Cybersecurity: What You Should Know

1
Comments
8 min read
AWS re:Inforce 2023 keynote highlights

AWS re:Inforce 2023 keynote highlights

2
Comments
4 min read
Privacy by Design and Privacy by Default in the Cloud

Privacy by Design and Privacy by Default in the Cloud

1
Comments
7 min read
Fostering security awareness

Fostering security awareness

4
Comments
9 min read
Cloud and the shared responsibility model misconceptions

Cloud and the shared responsibility model misconceptions

5
Comments
5 min read
Account Factory - provision AWS Accounts

Account Factory - provision AWS Accounts

1
Comments
3 min read
Creating and managing Accounts in AWS

Creating and managing Accounts in AWS

2
Comments
8 min read
Encryption of SSM session data using KMS

Encryption of SSM session data using KMS

2
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

9
Comments
2 min read
Serverless querying and evaluating of Logs using Athena

Serverless querying and evaluating of Logs using Athena

7
Comments
5 min read
loading...