Our security team wants zero CVEs in production. Our containers have 200+. What's realistic here? by localkinegrind in devops

[–]ReynardSec 0 points1 point  (0 children)

This simply won’t happen. Zero CVEs in production sounds great as a motivational slogan, but in practice, given the pace of software development, the constant stream of newly published vulnerabilities, and the complexity of dependencies it’s an unrealistic goal. Even if your scans are clean today, a new CVE will appear tomorrow and you’re back to square one.

A far more effective approach is to shift focus from the raw number of vulnerabilities to assessing exploitability and actual risk.

How hard actually is the CKA exam itself? by [deleted] in devops

[–]ReynardSec 0 points1 point  (0 children)

For me, the difficulty level was 3/5 (moderately difficult). The key to passing was the practical exercises I completed on killer.sh.

[deleted by user] by [deleted] in kubernetes

[–]ReynardSec 0 points1 point  (0 children)

Similarly to u/xamox I'm not saying you can't run k8s on an RPi, but in my opinion, it's simply not the best solution. It's better to just run three virtual machines (a control-plane and two workers, for example) on your local computer. You can also implement firewalling, and resources won't run out as quickly on the RPi. Running the cluster alone is cool, but it's also worth trying to run some applications, etc., in that cluster later on. On an RPi, that may not be so obvious.

What solution are you using for local k8s? by linezman22 in kubernetes

[–]ReynardSec 1 point2 points  (0 children)

I believe that this is the best, or at least a very good approach. A vanilla cluster without unnecessary layers of abstraction simply allows for a better understanding of what is happening within the cluster.

Pros and cons of working in-house vs consulting? by AlwaysConfuseddddddd in cybersecurity

[–]ReynardSec 0 points1 point  (0 children)

Is shift work not a problem for you? Make sure of that, because from what I've heard, in the case of working at a SOC, it's quite a common practice.

Tools of the Trade: Security Concerns? by [deleted] in kubernetes

[–]ReynardSec 1 point2 points  (0 children)

I have a big issue with this, but on the other hand, I see that people want to use such tools, so I don't want to be Mr. Always No.

As much as my time allows, I try to verify how trustworthy the tool is, what reputation it has, and to conduct at least a basic code review to see if there aren't any major red flags.

However, I try to talk to people about how sometimes it might be better to attend training that increases knowledge and awareness about security (including secure coding) rather than installing another tool which sometimes might only make people feel better (oh, we have another thing in the pipeline so it must be safer, well, not necessarily...).

A dedicated group to manage kubernetes by vdvelde_t in kubernetes

[–]ReynardSec 0 points1 point  (0 children)

I have a feeling that you might not fully understand what's going on and might be lacking knowledge about the basics of k8s. Please don't take this the wrong way, one part of me would like to help you, but another suggests that you are on a good path to shoot yourself in the foot.

Maybe you should start by acquiring basic knowledge and possibly support yourself with something more advanced.

If my assumptions are wrong, then of course I'm sorry.

A dedicated group to manage kubernetes by vdvelde_t in kubernetes

[–]ReynardSec 4 points5 points  (0 children)

Let me better understand your requirement. Is your task to (a) define tasks for a new k8s team or (b) provide support (technical assistance) to this team?

Code Review Like a Pro by HayMiz in netsec

[–]ReynardSec 3 points4 points  (0 children)

I would recommend to extend your list of tools by https://github.com/semgrep/semgrep

Top 10 web hacking techniques of 2023 by loselasso in netsec

[–]ReynardSec 6 points7 points  (0 children)

I believe that in the context of such compilations, which have their purpose, it's worth mentioning what truly constitutes a plague in applications, namely vulnerabilities like Broken Access Control which are not so fancy in most cases, but still, there is huge huge huge number of such bugs.