Public Notes on
View Public Collections

Inherited AWS Account best practices


#aws #p #security

Show More

Continious AWS IAM Security Practices


#security #aws #p #postgres

Show More

kdigger is a context discovery tool for Kubernetes penetration testing.


#kubernetes #security #p

Show More

a tool to audit the istio service mesh


#kubernetes #networking #security #p

Show More

Kubernetes Penetration testing tool


#kubernetes #security #p

Show More

AWS Access Keys - A reference (Must Read)


#aws #security #p

Show More

Never put AWS temporary credentials in the credentials file


#aws #security #p

Show More

Assume AWS roles in github actions


#ci/cd #aws #security #p

Show More

Vulnerability static analysis for docker containers


#docker #security #p

Show More

AWS Organizations best practices! A must read!


#aws #security #p

Show More

Docker anonymous registry with TTL for images


#docker #kubernetes #security #p

Show More

Security Extension to check for AWS Credentials in JS


#aws #security #p

Show More

Combine multiple AWS IAM Polices into a single policy set. Useful if you need to deal with multiple AWS Policies (AWS/Local) #aws #iam #security #p

Show More

Generate graphql based cloud inventory, cloud costing and security compliance querying with graphql data. #aws #security #p

Show More

Postgres SSL Settings & Ciphers #p #security #postgres #databases

Show More

Highlights

ssl_ciphers (string) Specifies a list of SSL cipher suites that are allowed to be used by SSL connections. See the ciphers manual page in the OpenSSL package for the syntax of this setting and a list of supported values. Only connections using TLS version 1.2 and lower are affected. There is currently no setting that controls the cipher choices used by TLS version 1.3 connections. The default value is HIGH:MEDIUM:+3DES:!aNULL. The default is usually a reasonable choice unless you have specific security requirements. This parameter can only be set in the postgresql.conf file or on the server command line.