This is our second article in the “Kubernetes Security series”. This article talks about Secret Management in Kubernetes. Once you start deploying applications to Kubernetes, you quickly realize Secrets Management takes a lot of time to get right. The Kubernetes Secret and ConfigMap objects don’t yet have all the features you’d expect to properly setup […]
This is the first part of our “Kubernetes Security Series”. In this part I’m going to explain how Network Policies can help you secure your network traffic within your Kubernetes cluster. Filtering network traffic First of all, you need to think about what kind of network traffic you want to filter. The easiest way filtering […]
Introduction Extremely proud to show you how we helped our FinTech costumer Cake to deliver a resilient and secure banking platform using Amazon Web Services. Executive Summary Startup Cake launched its banking app—rapidly and securely—with help from Amazon Web Services (AWS) Partner IN4IT. Using Amazon Elastic Container Service (Amazon ECS), Amazon Athena, Amazon SageMaker, and AWS […]
Techradar reported in early 2020 that Amazon Web Services now has 175 products. Between the start of SQS (November 2004) and August 2020, there are more than 7500 announcements made on “What’s new at AWS”. You might wonder how a typical application team, building and deploying their apps on AWS, is keeping up to date on […]
Companies often fall into the trap of building standardized infrastructure themselves, then offer it to their teams to run their workloads on. For example: Compute, IaaS, which let teams spin up and down compute; A mix of IaaS and DBaaS, making sure that databases are managed; Platform as a Service to let developers build and […]
When Amazon started rewriting its closed source software for networking devices (Source: Youtube), they started with a warning that it ‘ll get worse first before it’ll get better. They were surprised that it very quickly went a lot better because they were able to write very specific code for their use case without having to […]
What is AWS Config Every time you’re reading about yet another unprotected S3 bucket that has leaked, you’re probably wondering how is it possible to let this happen. When your AWS footprint gets bigger, it gets more difficult to keep track of all your AWS resources. You might have multiple AWS accounts, making it even […]
AWS Users and Roles can have their permissions limited by a Permission Boundary. The effective permissions are at the intersection of the user or role policy and the permission boundary (which is also defined as an IAM policy). One of the use-cases of using Permission Boundaries is to restrict external access of your AWS users […]
How Cake uses Kinesis to deliver real-time insights. Cake brings together all your existing bank accounts and transactions. The app analyses your financial data and habits, to make your life better. Cake makes your bank accounts pay off again, by sharing its profits with you. It’s the app that rewrites the rules. To make sure […]
Employees typically get a laptop or workstation to do their work. Contractors use their own laptops or workstations in most cases. This brings all kinds of challenges on how to manage and secure these. In small and medium companies there is often no time or resources to ensure the laptop is and stays secure. When […]