Open in app

Sign In

Write

Sign In

Avik Chowdhury
Avik Chowdhury

2 Followers

Home

About

Apr 8, 2021

Automated detection of Risky Permissions in AWS EKS Clusters

AWS EKS uses an authorization module called Role-Based Access Control (RBAC) to set the utilization permissions for the different components of the K8 Cluster. Ideally the principle of least privilege should be followed while assigning any roles as the principle of least privilege is the idea that any subject, user…

2 min read

Automated detection of Risky Permissions in Kubernetes Clusters
Automated detection of Risky Permissions in Kubernetes Clusters

2 min read


Sep 25, 2019

Incident Response in the Cloud (AWS)Part 1- Handling AWS Abuse Notifications

{This blog series is an effort from me to raise awareness about IR and threat detection in the Cloud. …

AWS

4 min read

Incident Response in the Cloud (AWS)Part 1- Handling AWS Abuse Notifications
Incident Response in the Cloud (AWS)Part 1- Handling AWS Abuse Notifications
AWS

4 min read

Avik Chowdhury

Avik Chowdhury

2 Followers
Following
  • Forensic Labs

    Forensic Labs

  • Netflix Technology Blog

    Netflix Technology Blog

  • Pawel Rzepa

    Pawel Rzepa

  • Jason Trost

    Jason Trost

  • Roberto Rodriguez

    Roberto Rodriguez

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech