#security
Read more stories on Hashnode
Articles with this tag
Configure access to Kubernetes resources using its RBAC Groups, AWS IAM Groups, and IAM Roles · We have two new projects in the Elastic Kubernetes...
Configuring AWS Secrets and Configuration Provider (ASCP) and Kubernetes Secrets Store CSI Driver for Kubernetes Secrets · Storing access data in...
How AWS IAM Roles for Kubernetes ServiceAccounts (IRSA) works, what role OpenID Identity Provider plays in AWS Elastic Kubernetes Service and AWS IAM ·...
Connecting an AWS IAM Role to a Kubernetes Pod via ServiceAccount for AWS S3 bucket permissions · We have Grafana Loki for logs and need to connect an...
Gitleaks: scan GitHub repositories for leaked secrets. Run as a Jenkins cronjob and send notifications to Slack. · A confidential data leak such as RDS...
Using Private Hosted Zones in the AWS Route53 for internal access from AWS VPC only · Private Hosted Zone in AWS Route53 allows limiting access to DNS...