Skip to the content.

Security

CS standards

CSF – Framework

CS Certifications

SSL/TSL certificates

These are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browser.

X.509

X.509 is a standard defining the format of public key certificates. These certificates are used in many Internet protocols, including TLS and SSL, which are the basis for HTTPS, the secure protocol for browsing the web.

In the context of X.509, an endpoint usually refers to a server or client that presents an X.509 certificate for authentication during a secure communication session. For example, when you connect to a secure website, the website’s server is an endpoint that presents an X.509 certificate to your browser to prove its identity.

In a broader context, an endpoint can also refer to a device or node that is an end point of a communication network, such as a computer, phone, or server. In the context of X.509, these devices might have their own certificates that they use to authenticate themselves to other devices or servers.

Zero trust security

Zero Trust Security is a model that assumes no trust for any entity—regardless of whether it’s inside or outside the network perimeter—trying to access network resources. Instead, every user, device, or system must be verified before access is granted.

Microsegmentation

This involves breaking up security perimeters into small zones to maintain separate access for separate parts of the network. For example, in a Kubernetes environment, network policies can be used to control traffic between pods.

Encryption

In a Zero Trust model, data should be encrypted at all times, both at rest and in transit. For example, in Google Cloud, customer data stored at rest is automatically encrypted without any action from the user.

Kubernetes

Apply all the security measures, just like onPrem

Image level

Authentication and Authorization

Network

In Transit

At Rest

CI/CD

Databases

Potential threats

Mitigations

Cloud

https://www.youtube.com/watch?v=jI8IKpjiCSM

SaaS PaaS

Identity

Who?

What?

When?

Where?


Auuthentication

Auuthorization

Auditing

PRO TIP: define your own roles, instead of using existing, to respect the principle oof least privelege

To learn

https://github.com/RhinoSecurityLabs/cloudgoat https://learntocloud.guide/#/ https://cloudbreach.io/labs/ https://cyberwoxacademy.com/azure-cloud-detection-lab-project/ http://flaws2.cloud https://learntocloud.guide/#/

https://www.nojones.net/posts/breaking-into-cloudsec

https://www.youtube.com/playlist?list=PLDqMNdDvMsRn_ocTwQJR_eXMnv6K2I8eV

https://www.youtube.com/watch?v=RoZeVbbZ0o0&t=0s

https://www.youtube.com/playlist?list=PLDqMNdDvMsRndwjXFmus-p7p7Erd57Dvx

https://www.youtube.com/watch?v=ZzeMNGFv12A&t=0s

https://www.youtube.com/watch?v=op4mShTfNwk&t=0s

https://www.youtube.com/watch?v=Nz0CrOzeVl0&t=3893s