This week's articles
Let's talk about Kubernetes on the Internet
Post providing information about Kubernetes network attack surface, some tricks for identifying Kubernetes clusters based on their responses to basic requests, and what information is visible on the Internet relating to exposed Kubernetes services.
Terraform Cloud Security Model
Document explaining the authorization model, potential security threats, and HashiCorp's recommendations for securely using Terraform Cloud.
Everything and Anything You Need To Know About SOC 2
What is SOC 2? SOC 2 is a cybersecurity compliance reporting framework that companies from all industries can use to prove security to interested third parties such as potential customers or investors. If you've been looking for SOC 2 content, look no further.
Where Do I Sign? Step-by-step Sigstore Adoption
#containers, #defend, #explain
Using Sigstore, we can iteratively improve our supply chain security, starting with signed attestations and moving toward signed provenance to protect the build.