<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Sandro Cirulli</title>
    <link>https://sandrocirulli.net/tags/security/</link>
    <description>Recent content in Security on Sandro Cirulli</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Wed, 31 Mar 2021 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://sandrocirulli.net/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Assess EKS Security with kube-bench</title>
      <link>https://sandrocirulli.net/assess-eks-security-with-kube-bench/</link>
      <pubDate>Wed, 31 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/assess-eks-security-with-kube-bench/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/kube_bench.png&#34;&#xA;    alt=&#34;kube-bench logo&#34; width=&#34;500&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://github.com/aquasecurity/kube-bench&#34;&gt;Image: kube-bench, Apache License 2.0&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I wrote a post on &lt;a href=&#34;https://scalefactory.com/blog/2021/03/31/assess-eks-security-with-kube-bench/&#34;&gt;The Scale Factory blog&lt;/a&gt; on how to assess EKS security with kube-bench. The blog post is also available on &lt;a href=&#34;https://medium.com/the-scale-factory/assess-eks-security-with-kube-bench-99821a56a8f2&#34;&gt;Medium&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloud Natives UK Meetup</title>
      <link>https://sandrocirulli.net/cloud-natives-uk-meetup-march-2021/</link>
      <pubDate>Tue, 30 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/cloud-natives-uk-meetup-march-2021/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/meetup.png&#34;&#xA;    alt=&#34;Meetup logo&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://www.meetup.com/&#34;&gt;Image: Meetup LCC ©&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I recently gave a lightning talk on assessing EKS security with kube-bench at &lt;a href=&#34;https://www.meetup.com/Cloud-Native-Kubernetes-Manchester/events/276264856&#34;&gt;Cloud Natives UK&lt;/a&gt;, a joint virtual event being put together by the Cloud Native groups in Manchester, Wales, Glasgow, and Edinburgh, representing the cloud native communities from each of the countries in mainland UK. This was a shorter but updated version of the talk I gave at the end of last year at two &lt;a href=&#34;../aws-user-group-meetups&#34;&gt;AWS User Group meetups&lt;/a&gt;. The slides are available here and a recording of the event is available on &lt;a href=&#34;https://www.youtube.com/watch?v=EVPjtUuMeMQ&amp;amp;t=23m44s&#34;&gt;YouTube&lt;/a&gt;. It was a very slick and well organized event (kudos to the organizers!) with very interesting presentations so check out the whole even on YouTube if you missed it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How I Passed the AWS Security Specialty Exam</title>
      <link>https://sandrocirulli.net/how-i-passed-the-aws-security-specialty-exam/</link>
      <pubDate>Mon, 01 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/how-i-passed-the-aws-security-specialty-exam/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/aws_security_specialty_badge.png&#34;&#xA;    alt=&#34;AWS Security Specialty badge&#34; width=&#34;400&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;Image: Amazon Web Services, Inc. ©&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I wrote a post on &lt;a href=&#34;https://scalefactory.com/blog/2021/01/31/how-i-passed-the-aws-security-specialty-exam&#34;&gt;The Scale Factory blog&lt;/a&gt; on how I passed the AWS Security Specialty exam. The blog post is also available on &lt;a href=&#34;https://medium.com/the-scale-factory/how-i-passed-the-aws-security-specialty-exam-ca30bfc1b637&#34;&gt;Medium&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Set Up a Site-to-Site VPN Connection</title>
      <link>https://sandrocirulli.net/how-i-passed-the-aws-security-specialty-exam/</link>
      <pubDate>Mon, 01 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/how-i-passed-the-aws-security-specialty-exam/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/aws_site_to_site_vpn.svg&#34;&#xA;    alt=&#34;AWS Site-to-Site VPN diagram&#34; width=&#34;700&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://scalefactory.com&#34;&gt;Image: The Scale Factory ©&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I wrote a post on &lt;a href=&#34;https://www.scalefactory.com/blog/2020/12/14/how-to-set-up-a-site-to-site-vpn-connection/&#34;&gt;The Scale Factory blog&lt;/a&gt; on how to set up an AWS Site-to-Site VPN connection. The blog post is also available on &lt;a href=&#34;https://medium.com/the-scale-factory/how-to-set-up-a-site-to-site-vpn-connection-ef84a0862a8c&#34;&gt;Medium&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AWS User Group Meetups</title>
      <link>https://sandrocirulli.net/aws-user-group-meetups/</link>
      <pubDate>Sun, 11 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/aws-user-group-meetups/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/meetup.png&#34;&#xA;    alt=&#34;Meetup logo&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://www.meetup.com/&#34;&gt;Image: Meetup LCC ©&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I recently gave a talk on assessing EKS security with kube-bench at two AWS User Group meetups, namely at &lt;a href=&#34;https://www.meetup.com/AWS-User-Group-Liverpool/events/274053802/&#34;&gt;AWS User Group Liverpool&lt;/a&gt; on 26th October 2020 and at &lt;a href=&#34;https://www.meetup.com/Cambridge-AWS-User-Group/events/274360362/&#34;&gt;Cambridge AWS User Group&lt;/a&gt; on 10th November 2020. These were two online events and the organisers and the audience were very friendly as you would expect from a good meetup! The slides are available &lt;a href=&#34;../talks/assessing_eks_security_with_kube-bench_aws_ug_liverpool.pdf&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Encrypt and Decrypt Emails and Files</title>
      <link>https://sandrocirulli.net/how-to-encrypt-and-decrypt-emails-and-files/</link>
      <pubDate>Sat, 23 Jun 2018 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/how-to-encrypt-and-decrypt-emails-and-files/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/privacy_encryption.jpg&#34;&#xA;    alt=&#34;Scrabble game showing the words Privacy and Encrypt&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://www.comparitech.com/&#34;&gt;Image: Richard Patterson CC BY 2.0&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;Somewhere I read that &lt;strong&gt;sending unencrypted email is like sending postcards&lt;/strong&gt;: anyone can potentially read them. This is not nice for privacy but becomes very dangerous when the content of the email or attached files contains secrets like passwords, access keys, etc. &lt;strong&gt;Anyone who can get hold of your email can also potentially access your systems&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;For sending encrypted email I generally use &lt;a href=&#34;https://www.enigmail.net/index.php/en/&#34;&gt;Enigmail&lt;/a&gt; which is data encryption and decryption extension for the Thunderbird email client. I also used &lt;a href=&#34;https://www.mailvelope.com/&#34;&gt;Mailvelope&lt;/a&gt; which is an add-on for Firefox and Chrome allowing to integrate encryption in webmail providers such as Gmail, Outlook, etc. These tools simplify the encryption/decryption process, especially if you are not familiar with it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to force HTTPS on Apache</title>
      <link>https://sandrocirulli.net/how-to-force-https-on-apache/</link>
      <pubDate>Sun, 23 Oct 2016 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/how-to-force-https-on-apache/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/https.png&#34;&#xA;    alt=&#34;https lock pad screenshot&#34;&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;&lt;strong&gt;I recently added an SSL certificate to this website&lt;/strong&gt;. I used &lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let’s Encrypt&lt;/a&gt; which is an awesome initiative to increase the use of HTTPS in websites by making SSL certificates free and easy to install.&lt;/p&gt;&#xA;&lt;p&gt;My web hosting provider offers Let’s Encrypt certificates via cPanel so installing one for my website was as easy as clicking few buttons. If you are not that lucky, Let’s Encrypt provides &lt;a href=&#34;https://letsencrypt.org/getting-started/&#34;&gt;instructions to install certificates via the shell&lt;/a&gt; as well as a list of &lt;a href=&#34;https://community.letsencrypt.org/t/web-hosting-who-support-lets-encrypt/6920&#34;&gt;hosting providers supporting Let’s Encrypt&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CD Summit and Jenkins Days 2016</title>
      <link>https://sandrocirulli.net/cd-summit-and-jenkins-days-2016/</link>
      <pubDate>Tue, 04 Oct 2016 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/cd-summit-and-jenkins-days-2016/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/cd-summit-and-jenkins-days-berlin-2016.png&#34;&#xA;    alt=&#34;CD Summit and Jenkins Days Berlin Splash Screen&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;http://www.devopsconnect.com/&#34;&gt;Image: DevOps Connect ©&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;This week I’m giving a talk about Continuous Security with Jenkins, Docker Bench, and Amazon Inspector at CD Summit &amp;amp; Jenkins Days in Amsterdam and in Berlin. CD Summit &amp;amp; Jenkins Days are a series of conferences in the US and in Europe focusing on Continuous Integration (CI) and Continuous Delivery (CD).&lt;/p&gt;&#xA;&lt;p&gt;This is the abstract of my talk:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Continuous Security with Jenkins and Amazon Inspector</title>
      <link>https://sandrocirulli.net/continuous-security-with-jenkins-and-amazon-inspector/</link>
      <pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/continuous-security-with-jenkins-and-amazon-inspector/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/amazon_inspector.png&#34;&#xA;    alt=&#34;Amazon Inspector logo&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://aws.amazon.com/inspector&#34;&gt;Image: Amazon Web Services, Inc. ©&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;Amazon Inspector is an automated security assessment service on Amazon Web Services (AWS). It allows to identify security vulnerabilities at operating system and network levels by scanning the host against a knowledge base of security best practices and rules.&lt;/p&gt;&#xA;&lt;p&gt;I recently integrated Amazon Inspector to run in a Jenkins job so that security testing can be automated and performed prior to deployment to production.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Continuous Security with Jenkins and Docker Bench</title>
      <link>https://sandrocirulli.net/continuous-security-with-jenkins-and-docker-bench/</link>
      <pubDate>Wed, 31 Aug 2016 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/continuous-security-with-jenkins-and-docker-bench/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/docker_bench.png&#34;&#xA;    alt=&#34;Docker Bench&#34; width=&#34;700&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://github.com/docker/docker-bench-security&#34;&gt;Image: Docker Bench - Apache 2.0 License&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/docker/docker-bench-security&#34;&gt;Docker Bench&lt;/a&gt; is an open source tool for automatically validating the configuration of a host running Docker containers. The tool has been written among others by Diogo Mónica, security lead at Docker, and performs security checks at the container level following &lt;a href=&#34;https://www.cisecurity.org/cis-benchmarks&#34;&gt;Docker’s CIS Benchmark recommendations&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;As you would expect, the easiest way to run Docker Bench is via a Docker container. Just make sure you have Docker 1.10 or better, download the Docker image:&lt;/p&gt;</description>
    </item>
    <item>
      <title>My deny list of IP addresses</title>
      <link>https://sandrocirulli.net/my-deny-list-of-ip-addresses/</link>
      <pubDate>Sun, 06 Mar 2016 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/my-deny-list-of-ip-addresses/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/security.jpg&#34;&#xA;    alt=&#34;Security key on a keyboard&#34; width=&#34;500&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://www.flickr.com/photos/gotcredit/33627531571/&#34;&gt;Image: GotCredit - CC BY 2.0 Deed&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;I monitor few websites for friends and had to configure security modules in order to &lt;strong&gt;prevent brute force attacks&lt;/strong&gt; and breaches in the admin interface of the website. For CMS like WordPress and Drupal there are some &lt;strong&gt;good security modules&lt;/strong&gt; like &lt;a href=&#34;https://wordpress.org/plugins/better-wp-security/&#34;&gt;Solid Security&lt;/a&gt; (formerly iThemesSecurity), &lt;a href=&#34;https://www.drupal.org/project/security_review&#34;&gt;Security Review&lt;/a&gt;, and &lt;a href=&#34;https://www.drupal.org/project/login_security&#34;&gt;Login Security&lt;/a&gt;. These modules improve the security of a website by limiting the number of failed login attempts and blocking the suspicious IP address.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to install and update KeePass</title>
      <link>https://sandrocirulli.net/how-to-install-and-update-keepass/</link>
      <pubDate>Mon, 03 Aug 2015 00:00:00 +0000</pubDate>
      <guid>https://sandrocirulli.net/how-to-install-and-update-keepass/</guid>
      <description>&lt;figure&gt;&lt;img src=&#34;../../img/keepass_logo.svg&#34;&#xA;    alt=&#34;KeePass logo&#34;&gt;&lt;figcaption&gt;&#xA;      &lt;p&gt;&#xA;          &lt;a href=&#34;https://commons.wikimedia.org/wiki/File:KeePass_Logo_%282016%29.svg&#34;&gt;Image: Christopher Bolin (original), Minoa (vectorisation), GPL License&lt;/a&gt;&lt;/p&gt;&#xA;    &lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;&lt;a href=&#34;http://keepass.info/&#34;&gt;KeePass&lt;/a&gt; is one of my favourite software. It is a password manager which allows to store secure passwords and forget about them. All you need to do is to remember one single (strong) password to open the software and that’s it. Considering the amount of passwords one has to remember these days, there is a bad tendency to use weak memorable passwords – or even worse always the same password! KeePass is good choice since it is cross-platform, uses strong encryption algorithms, and can store data offline.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
