Verify your Kubernetes Cluster Network Policies: From Faith to Proof

Implement a technical check that verifies implemented security measurements. In case of network policy, try to establish a blocked network connection. Keep the checks as simple as possible and propagate the results in existing monitoring solution. ...

June 27, 2020 · Jan Harrie

Training: Docker, Kubernetes & Security in Enterprise Environments

Kevin Kelpen & Jan Harrie, TROOPERS20, Heidelberg, Germany ...

March 20, 2020 · Jan Harrie

How to Secure OpenShift Environments and What Happens If You Don´t

Jan Harrie, DevSecCon, London, United Kingdom ...

November 20, 2019 · Jan Harrie

Das „s“ in DevOps steht für Security

Jan Harrie, BASTA! Autumn 2019, Mainz, Germany ...

September 19, 2019 · Jan Harrie

Docker, CI/CD & DevOps Security

Christoph Klaaßen & Jan Harrie, ISH Summit day, Munich, Germany ...

May 8, 2019 · Jan Harrie