Open in app

Sign In

Write

Sign In

Harsha Koushik
Harsha Koushik

247 Followers

Home

About

Published in

Kernel Space

·May 11

Infrastructure Security: a Personal Perspective

My ways of Fortifying Modern Infrastructure — a high level overview — Note: This article talks about How to define infrastructure security in layers. This will not dive deep into the “what” part much — what can be done in each layer can be covered in a separate blog and is very subjective. …

Infrastructure

5 min read

Infrastructure Security: a Personal Perspective
Infrastructure Security: a Personal Perspective
Infrastructure

5 min read


Published in

Kernel Space

·Jan 19

KubeShark: Wireshark for Kubernetes

A microscopic look into what’s happening in the cluster — Introduction Wireshark is a well known tool for Packet Capture, analysis and troubleshooting. It can capture live network traffic and analyze it in real-time at a microscopic level, or read and process saved capture files. Wireshark can dissect and display many different protocols, and has a powerful filtering system for narrowing…

Kubernetes

5 min read

KubeShark: Wireshark for Kubernetes
KubeShark: Wireshark for Kubernetes
Kubernetes

5 min read


Published in

Disney+ Hotstar

·Nov 1, 2022

ChatOps : Cloud Resource Explorer

Cloud Resource Explorer using simple ChatOps — Need to know your cloud dependencies in a pinch? Yes, we’ve been there. Here’s how we leveraged ChatOps to make our lives easier. The Problem We’ve got cloud, and we’ve got 99 problems about what’s residing in our clouds. On most days you might have the luxury of time to unravel this…

Cloud

6 min read

ChatOps — Cloud Resource Explorer
ChatOps — Cloud Resource Explorer
Cloud

6 min read


Published in

Kernel Space

·May 3, 2022

Why you should keep monitoring your AWS Managed Policies

Some of the Over Privileged AWS Managed IAM Policies — Introduction This article talks about some of the over privileged AWS Managed IAM Policies. When I say Over Privileged — its not just specific to that particular service, but also grants access to a completely different, and in some cases unrelated Service. For folks who are not really clear on what…

AWS

4 min read

Why you should keep monitoring your AWS Managed Policies
Why you should keep monitoring your AWS Managed Policies
AWS

4 min read


Published in

Kernel Space

·Mar 4, 2022

Why Steampipe over Boto3

Exploring Steampipe as an alternative for Querying — What is Boto3? Boto3 is just the name of Python SDK for AWS. Boto3 is undoubtedly one of the most used and wonderful SDKs used to make API calls to AWS in order to configure, manage and Query AWS Resources. Why not Boto3? It really felt good to use Boto3 which makes it easier to query…

Cloud

6 min read

Why Steampipe over Boto3
Why Steampipe over Boto3
Cloud

6 min read


Published in

Kernel Space

·Nov 8, 2021

Why Perimeter Security in Cloud is not as simple as it Sounds

Exploring the ways of doing Perimeter Security in Cloud — The phrase Perimeter Security sounds like a domain by itself right? Well you can think of it as a separate domain altogether depending on what elements you are dealing with in Perimeter Security. What is Perimeter by the way and why do we need to Secure it? Why Perimeter Security? Perimeter in terms…

Cloud

8 min read

Why Perimeter Security in Cloud is not as simple as it Sounds
Why Perimeter Security in Cloud is not as simple as it Sounds
Cloud

8 min read


Published in

Kernel Space

·May 31, 2021

Resource Limits in Linux | limits.conf

A Comprehensive Guide to understand Limits.conf file — Now we have a pretty good idea of why we should set Resource Limits after going through Fork Bomb article. If you have not read it yet, here it is — https://medium.com/kernel-space/linux-security-all-about-fork-bomb-75dd6741f060 . Fork Bomb is just one example, there is much more to limits file. We will explore all…

Linux

8 min read

Resource Limits in Linux | limits.conf
Resource Limits in Linux | limits.conf
Linux

8 min read


Published in

Kernel Space

·May 31, 2021

Linux Security: All about Fork Bomb

Silent, yet very efficient bomb. — Introduction Fork Bomb isn’t like normal bombs which make a lot of noise and create fire events. This bomb is very silent, but the consequences are quite violent. How violent the results are depends on which environment your System is running in. If it is your Production, it is time for…

Linux

4 min read

Linux Security: All about Fork Bomb
Linux Security: All about Fork Bomb
Linux

4 min read


Published in

Kernel Space

·May 13, 2021

Unpacking a Raw Packet | Transport Layer Segment | Part -3

Examining Transport Layer Segment in its RAW form — In the last article, we have seen how to unpack an Network Packet and finally get our Transport Layer Protocol Data Unit which is Segment. In this article we are going to further break this Data Down and look at what is inside a Segment. When it comes to Transport…

Networking

4 min read

Unpacking a Raw Packet | Transport Layer Segment | Part -3
Unpacking a Raw Packet | Transport Layer Segment | Part -3
Networking

4 min read


Published in

Kernel Space

·May 13, 2021

Unpacking a Raw Packet | Network Packet | Part -2

Examining Network Packet in its RAW form — In the last article, we have seen how to unpack an Ethernet Frame and finally get our Network Layer Protocol Data Unit which is Packet. In this article we are going to further break this Data Down and look at what is inside a Network Packet. In our case it…

Packet

4 min read

Unpacking a Raw Packet | Network Packet | Part -2
Unpacking a Raw Packet | Network Packet | Part -2
Packet

4 min read

Harsha Koushik

Harsha Koushik

247 Followers

Security Engineer , AWS Community Builder

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams