The three container security golden rules

As containers became a standard in IT applications, enumerating a few security best practices is now a business need. Therefore I’ve defined those three golden rules to keep in mind before pushing a new image for production to your company container repository.

I Careful with share volumes you will be Contrary to a Virtual Machine, a Docker container uses the host kernel directly, so in case of a kernel vulnerability restricted permissions on shared resources won’t protect you from an attacker.

Read more »

Secure your site with Lambda@Edge

Posted on

Let’s now deal with a more enjoyable subject. In my precedent posts, it was essentially related to Sysadmin aspects, I wrote those articles as I wasn’t able to find any satisfyingly complete reference online, so I’ve decided to write them. However, you probably see in my description corner that I am an Amazon Web Services certified, adept of DevOps and with a strong focus on the security aspects.…

Read more »

Ship your Applicative log files anywhere

As I recently had to manage an integration project for the Security Operation Center service of a big company, I had to configure applicative logs forwarding to the nearest SIEM syslog collector for each service included in the scope. I’ve found that the rsyslog agent is usually preinstalled in any Unix distribution with default operating system log folders configured out of the box so that the system log forwarding is most of the time almost as simple as service rsyslog start 1.…

Read more »

Static routes configuration on CentOS6

Context To introduce this post, let’s imagine you have a very bad IT provider which delivers you anon configured server. This server is so badly configured that although you have a CentOS machine installed on it, you only have access to the server management interface. Of course for project deadline reason, sending it back to your integrator, so that he can configure it a bit better, isn’t an option.…

Read more »

Taking advantage of quotas on Windows Server 2016

In this short article, I will show you how to use directory quota on Windows Server in order to launch a Powershell script when a limit threshold is reached. Although those settings have been done on a Windows Server 2016, it would probably work the same way on a 2012 or 2008 R2 machine. First, you need to install the File Server Resource Manager Role in the Windows Manager Console as shown in the screenshot below.…

Read more »