Open in app

Sign in

Write

Sign in

Noah
Noah

121 Followers

Home

Lists

About

Pinned

An Intro to Kubernetes Hardening.

Securing Kubernetes requires an understanding of many moving parts. This intro discusses the most important concepts for its defence.

Jan 6
4
An Intro to Kubernetes Hardening.
An Intro to Kubernetes Hardening.
Jan 6
4
Pinned

Hypercomputation and the Limits of Computing.

We have proven physical limits on precision, speed and energy, but are yet to bound computability.

Apr 30, 2023
Hypercomputation and the Limits of Computing.
Hypercomputation and the Limits of Computing.
Apr 30, 2023

Kubernetes Security: eBPF & Tetragon for Runtime Monitoring & Policy Enforcement

Exploring eBPF for runtime visibility into Kubernetes workloads with Tetragon.

Sep 28
Kubernetes Security: eBPF & Tetragon for Runtime Monitoring & Policy Enforcement
Kubernetes Security: eBPF & Tetragon for Runtime Monitoring & Policy Enforcement
Sep 28

The Containerization Tech Stack

Understanding Docker, OCI, Runtimes, Namespaces, gVisor, Kata and Confidential Containers.

Jul 22
The Containerization Tech Stack
The Containerization Tech Stack
Jul 22

Kubernetes Network Security: Exploring Cilium and Istio Implementations

Comparing the designs of Cilium and Istio — both popular service mesh choices.

Jun 23
Kubernetes Network Security: Exploring Cilium and Istio Implementations
Kubernetes Network Security: Exploring Cilium and Istio Implementations
Jun 23

Kubernetes Security Tools: Falco

Flaco, the goto for real time Kubernetes threat detection.

May 5
Kubernetes Security Tools: Falco
Kubernetes Security Tools: Falco
May 5

Kubernetes Security Tools: OPA Gatekeeper & Trivy

OPA Gatekeeper and Trivy are important Kubernetes security tools for admission control and to limit vulnerabilities and misconfigurations.

Mar 12
Kubernetes Security Tools: OPA Gatekeeper & Trivy
Kubernetes Security Tools: OPA Gatekeeper & Trivy
Mar 12

Kubernetes Security Tools: Seccomp & AppArmor

Seccomp and AppArmor are common Linux security modules which Kubernetes supports to control workload exposure to the kernel.

Mar 6
Kubernetes Security Tools: Seccomp & AppArmor
Kubernetes Security Tools: Seccomp & AppArmor
Mar 6
AWS in Plain English

Published in

AWS in Plain English

The Issue with Security Groups for EC2 Instance Isolation.

Security groups are commonly used to isolate instances as part of incident response. However, such solutions are not perfect.

Mar 2
The Issue with Security Groups for EC2 Instance Isolation.
The Issue with Security Groups for EC2 Instance Isolation.
Mar 2

A Kubernetes Pentesting Checklist.

Attacking the Kubernetes control plane, RBAC, EKS and more.

Feb 4
A Kubernetes Pentesting Checklist.
A Kubernetes Pentesting Checklist.
Feb 4
Noah

Noah

121 Followers

Writing to learn.

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams