Security
Concepts
Terminology
| Abbreviation | Meaning | Links |
|---|---|---|
| CIS | Center for Internet Security | CIS Kubernetes Benchmarks |
| CVE | Common Vulnerabilities and Exposures | cve.org |
| DLP | Data Loss Prevention | What is DLP? (example: Social Security Number (SSN)) |
| DPI | Deep Packet Inspection | What is DPI? |
| eBPF | ebpf.io, eBPF: Put the Kubernetes Data Plane in the Kernel | |
| FIPS | Federal Information Process Standard | |
| FISMA | Federal Information Security Management Act | |
| IAM | Idendity and Access Management | |
| IDS | Intrusion Systems | |
| IPS | Intrusion Prevention Systems | |
| OWASP | Open Web Application Security Project | owasp.org |
| OSI | Open Systems Interconnection | OSI Model Explained |
| SIEM | Security Information and Event Managers | |
| WAF | Web Application Firewall | What is a WAF? |
Securization logic
-
Principles
- Least privilege
- Zero-Trust
-
3 steps of authentication security
- Authentication
- Authorization
- Admission
-
Network traffic
- North-South
- East-West
Checklists
- 15 Point Kubernetes Security Checklist - May 5, 2021
Tools
Training
- A Cloud Guru