Blog
DevOps, tools, tips, and tech
Showing 9 posts tagged “security” · Clear filter
Organizational Guardrails with Service Control Policies
Part 9 of the AWS account structure series. Using Service Control Policies (SCPs) to set permission boundaries across your organization, with practical examples and common patterns.
IAM Identity Center - Why It Replaces IAM Users
Part 6 of the AWS account structure series. Setting up AWS IAM Identity Center for human access, understanding the identity store, and why it's the recommended approach over IAM users.
Permission Sets - Designing Access Patterns
Part 7 of the AWS account structure series. Creating permission sets in IAM Identity Center with managed policies, inline policies, and appropriate session durations.
Cross-Account Access Patterns - Deployment Roles and Role Chaining
Part 8 of the AWS account structure series. Designing cross-account deployment roles, understanding role chaining, and implementing external ID protection.
Keyless CI/CD with GitHub Actions OIDC
Part 5 of the AWS account structure series. Eliminating long-lived AWS credentials by using GitHub Actions OIDC for secure, keyless authentication.
Security Foundations - CloudTrail, Config, and Password Policies
Part 3: Setting up the security baseline with CloudTrail audit logging, AWS Config compliance monitoring, and password policies.
Automated TLS Certificates with Let's Encrypt and DNS-01 Challenges
Free, automated TLS certificates for Kubernetes using cert-manager, Let's Encrypt, and Route53 DNS validation for wildcard domains.
Secrets Management with Infisical and External Secrets Operator
No secrets in Git, but GitOps needs secrets. How to use Infisical with External Secrets Operator to bridge the gap in Kubernetes.
Kali Linux Desktop on WSL2: Win-KeX Setup Guide
Run Kali Linux desktop on Windows using WSL2 and Win-KeX. Complete guide to ESM (Enhanced Session Mode), seamless mode, and troubleshooting black screens.