Verify your Kubernetes Cluster Network Policies: From Faith to Proof

Implement a technical check that verifies implemented security measurements. In case of network policy, try to establish a blocked network connection. Keep the checks as simple as possible and propagate the results in existing monitoring solution. ...

June 27, 2020 · Jan Harrie

Training: Docker, Kubernetes & Security in Enterprise Environments

Kevin Kelpen & Jan Harrie, TROOPERS20, Heidelberg, Germany ...

March 20, 2020 · Jan Harrie

How to Secure OpenShift Environments and What Happens If You Don´t

Jan Harrie, DevSecCon, London, United Kingdom ...

November 20, 2019 · Jan Harrie

TROOPERS19

Heidelberg, Germany ...

March 20, 2019 · Jan Harrie

Kubernetes Basics and Principles

This blogpost is intended to be a background knowledge section for further posts. The content is all around Kubernetes basic principles and reflects more a dictionary then a legitim blog post. The section itself may not explain every nuance of the topic – only as much as necessary as needed in other posts. ...

Jan Harrie