k8s-deployment
aws-security-survival-kit
k8s-deployment | aws-security-survival-kit | |
---|---|---|
1 | 3 | |
0 | 438 | |
- | 1.1% | |
3.0 | 6.0 | |
9 months ago | about 1 month ago | |
Makefile | Makefile | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
k8s-deployment
-
Happy new year and release notes
Deployment: Kubernetes definitions have been updated to support new services, ports and so on. More info on its own repo: https://github.com/reconmap/k8s-deployment.
aws-security-survival-kit
-
Incident 2 – Additional details of the attack
This actually makes me feel better (overall) about Lastpass! as a company. That they can go into some detail shows confidence and an openness that I didn't previously experience. That said, their admission that they have lots of old credentials lying around is not good. Most of the things they changed have been pretty standard AWS recommendations for years now.
Side note, as a DevOps engineer this article does give me some additional pause in my everyday work. I try very hard to keep "work" relegated to my work computer and "home" stuff relegated to my home computer(s). However, sometimes the two do meet; generally when testing something. The upside is that I'm going to (try to) be a bit more careful in the future. I'm also going to install some additional AWS checks/balances on my accounts[0], just to make sure.
[0] https://github.com/zoph-io/aws-security-survival-kit
- aws-security-survival-kit
- AWS Security Survival Kit: Bare-minimum security alerting
What are some alternatives?
community.kubernetes - Kubernetes Collection for Ansible
matano - Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
k8s-diagrams - A collection of kubernetes-related diagrams
osquery-defense-kit - Production-ready detection & response queries for osquery
reconmap - Vulnerability assessment and penetration testing automation and reporting platform for teams.
helmfiles - Comprehensive Distribution of Helmfiles for Kubernetes
incident-response-plan-template - A concise, directive, specific, flexible, and free incident response plan template
device_google_taimen - Pixel 2 XL device sources not shared with the Pixel 2.
akk-stack - Containerized EverQuest Emulator Server Environment
platform_external_vanadium - Vanadium integration for GrapheneOS. See https://github.com/GrapheneOS/Vanadium for the Vanadium build configuration and patches.
howtheysre - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)