mirror of
https://github.com/nubenetes/awesome-kubernetes.git
synced 2026-05-22 17:13:42 +00:00
chore: update docs/devsecops.md [20260514-2029]
This commit is contained in:
committed by
GitHub
parent
09ef5834e6
commit
0a45954388
@@ -232,6 +232,7 @@
|
||||
- [devops.com: DevOps Security: Your Complete Checklist](https://devops.com/devops-security-your-complete-checklist)
|
||||
|
||||
## Authentication and Authorization
|
||||
- [Configure Microsoft Entra for Increased Security](https://learn.microsoft.com/en-us/entra/fundamentals/configure-security) - *(Related to kubernetes-security topic)*
|
||||
|
||||
- [thenewstack.io: How Do Authentication and Authorization Differ?](https://thenewstack.io/how-do-authentication-and-authorization-differ/)
|
||||
- [==osohq.com: Patterns for Authorization in Microservices==](https://www.osohq.com/post/microservices-authorization-patterns)
|
||||
@@ -289,6 +290,7 @@
|
||||
- [github.com/yannh/kubeconform 🌟](https://github.com/yannh/kubeconform) **A FAST Kubernetes manifests validator, with support for Custom Resources!**
|
||||
|
||||
## IaC and Security
|
||||
- [Automating Microsoft Sentinel Deployment with Azure DevOps CI/CD](https://noodlemctwoodle.medium.com/automating-microsoft-sentinel-deployment-with-azure-devops-ci-cd-2d4ae0c4e254) - *(Related to azure topic)*
|
||||
|
||||
- [thenewstack.io: Security Insights into Infrastructure-as-Code](https://thenewstack.io/security-insights-into-infrastructure-as-code/)
|
||||
|
||||
@@ -780,4 +782,5 @@ to restrict any unwanted, malicious behavior of cloud-native workloads at runtim
|
||||
<center>
|
||||
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">End to End Encryption Explained<a href="https://twitter.com/hashtag/infosec?src=hash&ref_src=twsrc%5Etfw">#infosec</a> <a href="https://twitter.com/hashtag/cybersecurity?src=hash&ref_src=twsrc%5Etfw">#cybersecurity</a> <a href="https://twitter.com/hashtag/pentesting?src=hash&ref_src=twsrc%5Etfw">#pentesting</a> <a href="https://twitter.com/hashtag/oscp?src=hash&ref_src=twsrc%5Etfw">#oscp</a> <a href="https://twitter.com/hashtag/informationsecurity?src=hash&ref_src=twsrc%5Etfw">#informationsecurity</a> <a href="https://twitter.com/hashtag/hacking?src=hash&ref_src=twsrc%5Etfw">#hacking</a> <a href="https://twitter.com/hashtag/cissp?src=hash&ref_src=twsrc%5Etfw">#cissp</a> <a href="https://twitter.com/hashtag/redteam?src=hash&ref_src=twsrc%5Etfw">#redteam</a> <a href="https://twitter.com/hashtag/technology?src=hash&ref_src=twsrc%5Etfw">#technology</a> <a href="https://twitter.com/hashtag/DataSecurity?src=hash&ref_src=twsrc%5Etfw">#DataSecurity</a> <a href="https://twitter.com/hashtag/CyberSec?src=hash&ref_src=twsrc%5Etfw">#CyberSec</a> <a href="https://twitter.com/hashtag/Hackers?src=hash&ref_src=twsrc%5Etfw">#Hackers</a> <a href="https://twitter.com/hashtag/tools?src=hash&ref_src=twsrc%5Etfw">#tools</a> <a href="https://twitter.com/hashtag/bugbountytips?src=hash&ref_src=twsrc%5Etfw">#bugbountytips</a> <a href="https://twitter.com/hashtag/Linux?src=hash&ref_src=twsrc%5Etfw">#Linux</a> <a href="https://twitter.com/hashtag/infosec?src=hash&ref_src=twsrc%5Etfw">#infosec</a> <a href="https://twitter.com/hashtag/itsecurity?src=hash&ref_src=twsrc%5Etfw">#itsecurity</a> <a href="https://twitter.com/hashtag/cybersecuritytips?src=hash&ref_src=twsrc%5Etfw">#cybersecuritytips</a> <a href="https://twitter.com/hashtag/securitybreach?src=hash&ref_src=twsrc%5Etfw">#securitybreach</a> <a href="https://twitter.com/hashtag/encryption?src=hash&ref_src=twsrc%5Etfw">#encryption</a> <a href="https://t.co/eejf8JL9VF">pic.twitter.com/eejf8JL9VF</a></p>— Shubham Sharma (@Shubham_pen) <a href="https://twitter.com/Shubham_pen/status/1492781841383890946?ref_src=twsrc%5Etfw">February 13, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
|
||||
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Critical Log Review Checklist For Security Incidents - by <a href="https://twitter.com/SANSInstitute?ref_src=twsrc%5Etfw">@SANSInstitute</a> <a href="https://twitter.com/hashtag/infosec?src=hash&ref_src=twsrc%5Etfw">#infosec</a> <a href="https://twitter.com/hashtag/cybersecurity?src=hash&ref_src=twsrc%5Etfw">#cybersecurity</a> <a href="https://twitter.com/hashtag/pentesting?src=hash&ref_src=twsrc%5Etfw">#pentesting</a> <a href="https://twitter.com/hashtag/oscp?src=hash&ref_src=twsrc%5Etfw">#oscp</a> <a href="https://twitter.com/hashtag/informationsecurity?src=hash&ref_src=twsrc%5Etfw">#informationsecurity</a> <a href="https://twitter.com/hashtag/hacking?src=hash&ref_src=twsrc%5Etfw">#hacking</a> <a href="https://twitter.com/hashtag/cissp?src=hash&ref_src=twsrc%5Etfw">#cissp</a> <a href="https://twitter.com/hashtag/redteam?src=hash&ref_src=twsrc%5Etfw">#redteam</a> <a href="https://twitter.com/hashtag/technology?src=hash&ref_src=twsrc%5Etfw">#technology</a> <a href="https://twitter.com/hashtag/DataSecurity?src=hash&ref_src=twsrc%5Etfw">#DataSecurity</a> <a href="https://twitter.com/hashtag/CyberSec?src=hash&ref_src=twsrc%5Etfw">#CyberSec</a> <a href="https://twitter.com/hashtag/Hackers?src=hash&ref_src=twsrc%5Etfw">#Hackers</a> <a href="https://twitter.com/hashtag/tools?src=hash&ref_src=twsrc%5Etfw">#tools</a> <a href="https://twitter.com/hashtag/bugbountytips?src=hash&ref_src=twsrc%5Etfw">#bugbountytips</a> <a href="https://twitter.com/hashtag/Linux?src=hash&ref_src=twsrc%5Etfw">#Linux</a> <a href="https://twitter.com/hashtag/infosec?src=hash&ref_src=twsrc%5Etfw">#infosec</a> <a href="https://twitter.com/hashtag/itsecurity?src=hash&ref_src=twsrc%5Etfw">#itsecurity</a> <a href="https://twitter.com/hashtag/cybersecuritytips?src=hash&ref_src=twsrc%5Etfw">#cybersecuritytips</a> <a href="https://t.co/4zWIq1pkYO">pic.twitter.com/4zWIq1pkYO</a></p>— Shubham Sharma (@Shubham_pen) <a href="https://twitter.com/Shubham_pen/status/1492812040490024961?ref_src=twsrc%5Etfw">February 13, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
|
||||
</center>
|
||||
</center>
|
||||
- [Kubernetes Security Best Practices: A DevSecOps Perspective](https://www.linkedin.com/top-content/career/) - This LinkedIn post discusses the challenges women face in advancing their careers in asset management, particularly concerning promotion decisions during childbearing years. It highlights how career interruptions and childcare responsibilities can disproportionately affect women's earnings and career progression. The author also touches on the career risks associated with pregnancy for women in new roles.
|
||||
Reference in New Issue
Block a user