Using CheatSheets To Apply Best Practices

Cheatsheet: Linux Security

Cheatsheet: Linux Security

1.1 Security Concepts

Name Comment
RABC  
Public key infrastructure(PKI)  
User impersonation A user can act as another user through impersonation headers.
Principal User Identities  
Reference CheatSheet: linux-capabilities, CheatSheet: Kubernetes Security

1.2 Token

Name Comment
token e.g, link: kubeadm token
Static token  
Service Account Token  
OpenID Connect Token  
Bear token In k8s, every service account has a secret with valid Bearer Token
Refresh token  

1.3 Identity Provider Management

Name Comment
htpasswd HTTP basic auth
Keystone  
LDAP  
Client certificates  
Request header  
OpenID connect(OIDC)  
Authenticating proxy  
Authentication webhook Webhook authentication is a hook for verifying bearer tokens
Oauth  
OpenID  
  • Multiple authenticator: Usually the first module to successfully authenticate the request short-circuits evaluation.

1.4 Chmod

Name Comment
Add execute for shell script chmod a+x my.sh

1.5 Chown

Name Comment

1.6 Products

Name Comment
AppDefense A data center endpoint security product. Protect applications running in virtualized envs. YouTube link

1.7 AppArmor

Name Comment
   


Leave a Reply

Your email address will not be published. Required fields are marked *