This is going to be a short blog post detailing another migration I undertook to simplify my current stack.
This time, I replaced SES with Cloudflare Email Routing for incoming emails across my domains.
This is going to be a short blog post detailing another migration I undertook to simplify my current stack.
This time, I replaced SES with Cloudflare Email Routing for incoming emails across my domains.
As you might know, I’m working on my next side-project, The CloudSec Engineer, a book on entering, establishing yourself, and thriving in the cloud security industry as an individual contributor.
As part of the book’s introduction, I’ve been researching common career pathways within the security industry to contextualise where Cloud Security fits into the big picture.
I’ve always wanted to setup a Pi-hole to block advertisements in my home office, but, at the same time, I didn’t want physical boxes lying around to maintain (plus, I do hate cables).
In this blog, I’ll explain how I managed to mimic the Pi-hole’s behaviour using only serverless technologies (Cloudflare Gateway, to be precise).
Early last year, I wrote “On Establishing a Cloud Security Program”, outlining some advice that can be undertaken to establish a cloud security program aimed at protecting a cloud native, service provider agnostic, container-based offering. The result can be found in a micro-website which contains the list of controls that can be rolled out to establish such cloud security program: A Cloud Security Roadmap Template.
Following that post, one question I got asked was: “That’s great, but how do you even know what to prioritize?”
CVE-2022-0847 (aka “Dirty Pipe”) was released earlier this week (2022-03-07
).
This blog aims to provide a quick summary and actionable advice for defenders of cloud environments and those teams who are asked to determine its impact on their company’s infrastructure.