This week's articles
Cloud Security Remediation Guides
#aws, #azure, #defend, #gcp
CloudSploit's remediation guides are intended to be an open-source resource for improving cloud security. Many cloud IaaS providers like AWS, Azure, and Google Cloud have a shared responsibility model. They provide the physical and architectural security, along with tools to properly secure the services they offer, but it is up to the user to configure those settings properly.
Istio OIDC Authentication
How Istio can be configured to manage the OpenID Connect (OIDC) authentication flow for applications running within the mesh to allow both authentication and authorisation decisions to be offloaded to Istio.
Deep dive into the different types of evasion and bypasses an adversary will use during an attack chain.