Working with TLS Certificates in Kubernetes (The hard way) – Part 1

As you may already know, certificates plays an important role in Kubernetes clusters. This is because the communications between various Kubernetes components are secured using TLS. For this encryption of communication and for authentication purposes, we need certificates. Here, the authentication method is 2 way authentication. So this means we need certificates for both the […]

API Security | Oauth for RESTful APIs

In this blogpost, we will look at API Security. More specifically, we will see how we can use Oauth for RESTful APIs. For this we will be using some already available opensource software. The code for the example in this post is available at : https://github.com/ihsanizwer/API-Security-Oauth-for-RESTful-API. Basically, what I am trying to do here is […]

CSRF in WebApps | Double Submit Cookie Patterns

In this blogpost we will look at how we can implement Cross-Site Request Forgery protection via Double Submit Cookie Patterns. First things first This blog is primarily focused on security. Hence, firstly, I will integrate the OWASP dependency check plugin to my project. With Maven, we blindly add many dependencies/ 3rd party libraries without checking […]

CSRF protection in WebApps via STP

In this blogpost we will look at how we can implement Cross-Site Request Forgery protection via Synchronizer Token Patterns(STP). First things first – As you would have noticed already, this blog is primarily focused on security. Hence, to get started, I will integrate the OWASP dependency check plugin to my project. With Maven, we blindly […]

Physical security for your network/data center.

Before considering applying access control lists, firewalls and other such controls to protect your network, we must consider physical security. Because, if an adversity can easily access and tamper our devices physically, what is the point of other controls? In this post we will dive in to physical security for your network. Physical Security Categorization […]

Prevent grub bypass

In my previous blog post, I wrote on how to bypass grub in Linux. Therefore in this blog we will look at how to prevent grub bypass. So we know by now that sometimes this can be problematic. But sometimes when we don’t need security we can simply grub as it is. If you need […]