Security

Threat Modelling: An Overview

Reading Time: 3 minutes A secure architecture has become the need of the hour for almost everyone. As a result, no one needs any vulnerabilities in their clusters. But is it wise to add security after a mishap has occurred? What if we can identify potential risks at the time of development itself? This is exactly where Threat Modelling fits almost perfectly while helping organisations excel in creating more Continue Reading

Understanding DevSecOps for Kubernetes

Reading Time: 4 minutes Increase in Security Demands for Cloud Native Ecosystems In today’s world, the need for securing our cloud native clusters has increased more than ever. Also this year, cloud-native security is again top trending, according to a report published by Gartner. DevSecOps is a simple answer to multiple questions. In the recently concluded KubeCon 2020, we saw that a lot of organisations are taking huge strides Continue Reading

Knoldus-Blog-Monitoring-Solution-with-rust

Monitoring solutions reduce costs & lead to better asset utilization

Reading Time: 2 minutes In a world where the future’s uncertain and businesses are compelled to embrace digital solutions, an unreliable IT infrastructure is out of the question. After all, you cannot afford application outages, security breaches, or system downtimes as they can harm business continuity. According to Gartner, the average cost of IT downtime is $5,600 per minute, which varies across industries. However, the right monitoring tools provide Continue Reading

An Introduction to SSH – Secure Shell

Reading Time: 4 minutes What is SSH ? SSH is a network protocol that allows secure connection between different computers. SSH protocol also referred to as Secure Shell, provides many functionalities like, Strong connection and security Strong authentication Maintains connection integrity Strong encryption. In general, there are different ways for logging in to a remote machine, Know the password of that machine. SSH public and private keys. Host-based authentication Continue Reading

Introduction To Ansible Vault

Reading Time: 2 minutes Hi readers, in this blog we will be discussing Ansible vault. Also, we will be looking at how to encrypt different playbooks and how they can be decrypted. Introduction The “Vault” is a feature of Ansible that allows you to keep sensitive data such as passwords or keys protected at rest, rather than as plain text in playbooks or roles.  Why use Ansible Vault? Ansible Continue Reading

A Quick Guide through UFW – Uncomplicated Firewall

Reading Time: 4 minutes UFW, short for Uncomplicated Firewall, is basically a simplified firewall mechanism that is implemented upon iptables itself. As a result, making it much easier to configure ufw than to configure iptables. Therefore, it can be said that ufw is technically a program for managing a netfilter firewall which aims to provide an easy to use interface for the user. Need for UFW – uncomplicated firewall Continue Reading

Go Through with Rego components

Reading Time: 3 minutes In this blog, we’ll understand Rego that uses for declaring policy in OPA(open policy Agent). Rego is a declarative logic programming language, not a programming language. We can get content based on the policy defined by Rego as it’s declarative nature it has many benefits than the imperative language.

Encryption with PBKDF2

Reading Time: 4 minutes Passwords can be the most valuable data to an attacker because stolen passwords can provide attackers the ability to bypass most of the security perimeters that exists in the system. Since lot of people use the same password in several other systems, one system compromise can affect the security of other systems too. This is where we can use encryption as a solution for theses Continue Reading

Store Git Credentials Encrypted

Reading Time: 3 minutes Hey folks in this blog post we would be looking over how we can store our git credentials in an encrypted format over linux remote servers, let’s first quickly have a look why we want to do it and what git provide us with as options. Git credentials helpers So git provide many types of credential helpers like Store The first and most basic type Continue Reading

Vault: A secure way to keep your App’s secrets

Reading Time: 3 minutes In this blog, we will discuss the Vault. In modern scenarios, we want to secure our system as much as possible. We don’t want to store our secret keys and certificates in the system or configurations. We need a place where we can keep our secrets with more security and access them securely whenever we need them. We can use the Vault. Vault is the Continue Reading

How to start with Vega : The web security scanner?

Reading Time: 3 minutes Vega – Web security scanner and web security testing platform. Alright, Today I have come up with an interesting topic which is Vega and this blog is inspired by the last blog I wrote on web security. Vega is nothing but a tool, we will talk more about Vega in a while but let’s first talk ‘Why Vega’. So, next when you are done with your Continue Reading

Actions in Play Framework

Authentication using Actions in Play Framework

Reading Time: < 1 minute Actions in Play Framework plays an important, the requests received by a Play application are handled by an Action. Action composition is an incredibly powerful way to enhance or restrict controller behaviour. In Play Framework controllers consist of methods that create Action objects to handle the incoming requests. A play.api.mvc.Action is basically a (play.api.mvc.Request => play.api.mvc.Result) function that handles a request and generates a result to be sent to the client. We can Continue Reading