Cloud | Google Cloud Platform | Security How to find the least privileged IAM Role in Google Cloud Platform Mark van Holsteijn 06 Mar, 2022
Cloud | Google Cloud Platform | Security | Terraform How to use OS Login for SSH access to VMs on GCP Chris ter Beke 28 Jan, 2022
AWS | Cloud | Security | Terraform Multi-region KMS keys and secrets in AWS Bruno Schaatsbergen 27 Jan, 2022
Cloud | Google Cloud Platform | Security | Technology How to take over a subdomain in Google Cloud DNS Mark van Holsteijn 27 Jan, 2022
AWS | Cloud | Security | Technology How to set up AWS Session Manager logging cross account Joris Conijn 26 Jan, 2022
Cloud | Google Cloud Platform | Security How to access private GKE clusters from Google Cloud Build via the Identity Aware Proxy Mark van Holsteijn 06 Jan, 2022
DevSecOps | Security | Software Development | Software Quality 6 Pointers on Application Logging Jeroen Willemsen 05 Jan, 2022
AWS | Cloud | Python | Security This is how you can test your cfn-guard rules Joris Conijn 29 Dec, 2021
Cloud | Google Cloud Platform | Security | Terraform How to list Google services which support VPC Service Controls Mark van Holsteijn 22 Dec, 2021
DevSecOps | Security | Software Development Log4J - A 10 step mitigation plan Jeroen Willemsen , Edzo Botjes , Jesse Houwing
Cloud | Google Cloud Platform | Security How to connect to a GKE private endpoint using the Identity Aware Proxy Mark van Holsteijn 11 Dec, 2021
AWS | Cloud | Security How do you prove that your infrastructure is compliant Joris Conijn 23 Nov, 2021