k8s Security

Over the past few months I’ve collected a few good resources regarding Kubernetes security. I will add more as I learn. Reference Securing a Cluster This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. CIS Kubernetes Benchmark version 1.6.1 Released in October 2020, it provides prescriptive guidance for establishing a secure configuration posture for Kubernetes. Kubernetes security best practices It covers a few suggestions on what can you do to make your Kubernetes workloads more secure....

<span title='2020-10-31 23:04:50 -0400 -0400'>October 31, 2020</span>&nbsp;·&nbsp;1 min&nbsp;·&nbsp;David Xiao

CASB Deployment

Cloud Access Security Broker (CASB) is considered a common solution to mitigate “shadow IT” and data exfiltration risks on many organization’s journey to cloud.

<span title='2020-11-01 00:00:00 +0000 UTC'>November 1, 2020</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;David Xiao

What Is Zero Trust

This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.

<span title='2020-10-31 00:00:00 +0000 UTC'>October 31, 2020</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;David Xiao

Explain Border Gateway Protocol in 5 Minutes

This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.

<span title='2020-10-30 00:00:00 +0000 UTC'>October 30, 2020</span>&nbsp;·&nbsp;4 min&nbsp;·&nbsp;David Xiao

IoT Security

IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.

<span title='2020-10-29 00:00:00 +0000 UTC'>October 29, 2020</span>&nbsp;·&nbsp;1 min&nbsp;·&nbsp;David Xiao