Blog

DevOps, tools, tips, and tech

Showing 9 posts tagged “security · Clear filter

Organizational Guardrails with Service Control Policies diagram
Click to expand
708 × 433px
·
#aws#organizations#security#terraform

Organizational Guardrails with Service Control Policies

Part 9 of the AWS account structure series. Using Service Control Policies (SCPs) to set permission boundaries across your organization, with practical examples and common patterns.

IAM Identity Center - Why It Replaces IAM Users diagram
·
#aws#iam#security#terraform#opentofu

IAM Identity Center - Why It Replaces IAM Users

Part 6 of the AWS account structure series. Setting up AWS IAM Identity Center for human access, understanding the identity store, and why it's the recommended approach over IAM users.

Permission Sets - Designing Access Patterns diagram
Click to expand
426 × 417px
·
#aws#iam#security#terraform#opentofu

Permission Sets - Designing Access Patterns

Part 7 of the AWS account structure series. Creating permission sets in IAM Identity Center with managed policies, inline policies, and appropriate session durations.

Cross-Account Access Patterns - Deployment Roles and Role Chaining diagram
·
#aws#iam#security#terraform#opentofu#cicd

Cross-Account Access Patterns - Deployment Roles and Role Chaining

Part 8 of the AWS account structure series. Designing cross-account deployment roles, understanding role chaining, and implementing external ID protection.

Keyless CI/CD with GitHub Actions OIDC diagram
·
#aws#github-actions#security#cicd#terraform

Keyless CI/CD with GitHub Actions OIDC

Part 5 of the AWS account structure series. Eliminating long-lived AWS credentials by using GitHub Actions OIDC for secure, keyless authentication.

Security Foundations - CloudTrail, Config, and Password Policies diagram
Click to expand
620 × 487px
·
#aws#security#terraform#opentofu

Security Foundations - CloudTrail, Config, and Password Policies

Part 3: Setting up the security baseline with CloudTrail audit logging, AWS Config compliance monitoring, and password policies.

Automated TLS Certificates with Let's Encrypt and DNS-01 Challenges diagram
Click to expand
1101 × 440px
·
#kubernetes#tls#dns#aws#security

Automated TLS Certificates with Let's Encrypt and DNS-01 Challenges

Free, automated TLS certificates for Kubernetes using cert-manager, Let's Encrypt, and Route53 DNS validation for wildcard domains.

Secrets Management with Infisical and External Secrets Operator diagram
Click to expand
1116 × 471px
·
#kubernetes#secrets#infisical#external-secrets#gitops#security

Secrets Management with Infisical and External Secrets Operator

No secrets in Git, but GitOps needs secrets. How to use Infisical with External Secrets Operator to bridge the gap in Kubernetes.

Kali Linux Desktop on WSL2: Win-KeX Setup Guide diagram
·
#wsl2#kali#linux#desktop#security

Kali Linux Desktop on WSL2: Win-KeX Setup Guide

Run Kali Linux desktop on Windows using WSL2 and Win-KeX. Complete guide to ESM (Enhanced Session Mode), seamless mode, and troubleshooting black screens.