Edera’s Am-I-Isolated Tool: Fortifying Container Security

In the fast-evolving landscape of cloud-native technologies, securing containerized workloads is a top priority. Kubernetes and containers power modern applications, but their shared kernel architecture introduces risks like privilege escalation and container breakouts. Edera’s Am-I-Isolated tool, an open-source security scanner, steps in to address these challenges by evaluating container isolation and offering practical fixes. Written … Continue reading Edera’s Am-I-Isolated Tool: Fortifying Container Security

Set up Role-Based Access Control (RBAC) in Vault

Providing efficient and customized access management for sensitive information is critical to upholding robust security and protecting a company’s confidential data. With HashiCorp Vault’s roles and policies, you can implement that control reliably and with assurance. Prerequisites: You require a running vault cluster for this activity. Refer to the official link https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run for a refresher … Continue reading Set up Role-Based Access Control (RBAC) in Vault

Set Up Mutual TLS (mTLS) with Vault’s PKI Secrets Engine

Mutual TLS (mTLS) is a security mechanism that requires both the client and the server to verify each other's identities using digital certificates. In contrast to one-way TLS, where only the server’s identity is validated, mTLS adds an extra layer of security by ensuring mutual authentication. Vault's PKI secrets engine streamlines the management of these … Continue reading Set Up Mutual TLS (mTLS) with Vault’s PKI Secrets Engine

The trifecta of ARM, Assembly, and C: Pointers, Registers, and …

Our sincerest request to the reader is to go through the previous post The trifecta of ARM, Assembly, and C. This discussion builds up on top of it. We often tend to develop for a particular OS on regular development cycles. It may sound improbable, but often most embedded developers find dealing in tandem with constructs … Continue reading The trifecta of ARM, Assembly, and C: Pointers, Registers, and …