Articles
Publishing SCC findings to a Pub/Sub
Security Command Center is Google Cloud’s centralized vulnerability and threat reporting service. Security Command Center helps you strengthen your security posture by evaluating your security and data attack surface; providing asset inventory and discovery; identifying misconfigurations, …
CKS #1: 4 C's of Cloud Native Security
Threat actors frequently find opportunities in complex software systems, and cloud-native systems are no exception. Defense-in-depth methodology, used by cloud-native security, separates the system into four tiers. The four Cs of cloud-native security are: Cloud, Cluster, Container and Code
Delete Kubernetes namespace stuck in terminating status
If you have encountered or are stuck with a namespace stuck in Terminating
stage, you can remove it easily using kubectl
GCP: About Encryption
GCP uses AES-256 encryption by default when data is at-rest in Google Cloud Storage, and data-in-transit is encrypted with TLS by default. When encrypting data on the Cloud, GCP utilizes DEKs and KEKs, which are used and stored with Google’s Key Management Service (KMS) API.
India's internet privacy and how it doesn't actually exist
If you are in India, you must have heard about debates that went on for VPN and Personal data protection(PDP) bill. With VPNs being controlled and no data protection law in sight, the right to privacy for internet anonymity is being erased.
Kubernetes: Scheduling notes
In Kubernetes, scheduling refers to making sure that Pods are matched to Nodes so that Kubelet can run them. A scheduler watches for newly created Pods that have no Node assigned. For every Pod that the scheduler discovers, the scheduler becomes responsible for finding the best Node for that Pod to …