Skip to main content

34 posts tagged with "Security"

Cloud and infrastructure security

View All Tags

Secrets Manager vs Parameter Store vs Vault — Secure Your Secrets on AWS

· 6 min read
Goel Academy
DevOps & Cloud Learning Hub

A developer pushes a commit. Buried on line 47 of a config file is a database password in plaintext. The repo is public. Within 6 hours, a bot has scraped the credential, connected to the RDS instance, and exfiltrated the user table. This isn't hypothetical — GitHub reports revoking millions of leaked secrets every year. The fix isn't discipline; it's architecture.

Azure Private Link, Service Endpoints, and Hub-Spoke Topology

· 9 min read
Goel Academy
DevOps & Cloud Learning Hub

You have VNets, subnets, and NSGs from the basics. But your security team wants to know why your storage account is accessible from the public internet, your database traffic traverses Microsoft's backbone instead of your private network, and your 12 spoke VNets have no central firewall. Time to graduate to enterprise networking — where every PaaS service gets a private IP and every packet flows through your inspection points.

DevSecOps — Shift Security Left Without Slowing Down

· 7 min read
Goel Academy
DevOps & Cloud Learning Hub

The average cost of a data breach hit $4.88 million in 2024, and the average time to detect one was 194 days. DevSecOps aims to flip this by embedding security into every stage of the development lifecycle — not as a gate at the end, but as a continuous practice from the first line of code.

Rootless Docker — Run Containers Without Root Privileges

· 8 min read
Goel Academy
DevOps & Cloud Learning Hub

By default, the Docker daemon runs as root. Every container you start has root-level access to the host kernel. If an attacker escapes the container — through a kernel vulnerability, a misconfigured volume mount, or a privileged container — they land on the host as root. Game over. Rootless mode eliminates this risk by running both the Docker daemon and containers under a regular, unprivileged user account.

Kubernetes Security — Pod Security Standards, Network Policies, and OPA

· 6 min read
Goel Academy
DevOps & Cloud Learning Hub

Here is a scenario that happens far too often: a developer deploys a container that runs as root, mounts the host filesystem, and has no network restrictions. An attacker exploits a vulnerability in the application, escapes the container, and now has root access to the node — and from there, to the entire cluster. Kubernetes gives you powerful security primitives, but none of them are enabled by default.

Terraform Security — tfsec, Checkov, and Policy as Code

· 6 min read
Goel Academy
DevOps & Cloud Learning Hub

The fastest way to create a security incident is to deploy infrastructure that was never reviewed for misconfigurations. A public S3 bucket, an open security group, an unencrypted RDS instance — these are not sophisticated attacks. They are configuration mistakes that tools can catch automatically. Security scanning for Terraform has matured to the point where there is no excuse for skipping it.