Published inGoogle Cloud - CommunitySecuring Containers With Google’s Container Optimized OS & Distroless Container ImagesComputing infrastructure has many layers. For many modern containerized cloud workloads, you’ll need to consider both the virtual machine…Apr 11, 20221Apr 11, 20221
Published inInfoSec Write-upsKubernetes Container Escape With HostPath MountsMounting the host filesystem into a container as a volume should keep you up at night if you work with Kubernetes. Let me explain why.Aug 23, 20212Aug 23, 20212
Published inGoogle Cloud - CommunityGoogle Kubernetes Engine (GKE) Security Best PracticesIn the cloud provider battle for the best managed Kubernetes services, Google Kubernetes Engine (GKE) takes the lead for many as their…Aug 16, 20212Aug 16, 20212
Published inInfoSec Write-upsHijacking Kubernetes Services with LabelsAccording to the kubernetes documentation, labels are just intended to be used to identify attributes to users. But what if…Jun 24, 2021Jun 24, 2021
Published inInfoSec Write-upsBypassing Container Image ScanningContainer technology has become the backbone of modern computing. Most modern companies are now running containers in production…May 26, 2021May 26, 2021
Published inSigma ComputingModern Bastion HostsIn the modern world of networking, where do bastion hosts fit in? Even in a perfect world of Zero Trust with extremely robust user and…May 13, 20212May 13, 20212