In the third article in this series, we cover solving our recurring problem with Asyncio. Asyncio is by far the lowest-overhead form of concurrency available in Python, but it has limitations on the kinds of problems it’s helpful with.
In this article, I explain an authentication proxy (“authproxy”) method for sharing secrets with containers which was uses Custodia’s cool UNIX domain socket trick. The result is a simpler, easier-to-deploy system with most of the advantages of the Custodia method.
Di Original dated Aug 2, 2017 found at https://www.peerlyst.com/posts/sharing-secrets-with-containers-using-custodia-alan-robertson Distributing secrets in container environments is done dangerously more often than safely. This article gives an overview of secrets distribution using the open source Custodia package to distribute secrets safely in a really cool and novel way. Custodia will work in many more environments than this, […]
This article covers how to use system processes both with and without thread pools as Python concurrency methods.
This article is the first in a series of articles each illustrating two methods of processing multiple requests with varying amounts and types of concurrency. In this article, I’ll cover simple loops and thread pools.
In this article I give my view of how well the Assimilation System Management Suite CMDB meets the criteria of an security-oriented CMDB (SOCMDB) – answering the question – “How useful is the Assimilation CMDB for security?”.
The idea of a configuration management database (CMDB) is that it should be able to tell you all the interesting attributes of your environment. It’s not hard to imagine that just the right CMDB could be a great help in securing your systems and improving your security posture. In this article we’ll look in more detail at what a Security-Oriented CMDB (SOCMDB) should look like – and why you should care.
In a couple of earlier blog posts, I wrote an article about what characteristics would make a CMDB suitable for a “modern” DevOps-like environment. The first article talked about what characteristics one would like in such a CMDB. The second article evaluated the Assimilation Suite in terms of those characteristics. This article discusses how a CMDB can improve your security posture.
In today’s blog post, I’d like to do something similar – but looking at a CMDB from a security perspective. That is, this blog post is the first part of a discussion of what a security-oriented CMDB ought to look like and how it can improve your security posture.
A question I get asked fairly often is “How is the Assimilation Suite different from orchestration tools like Chef, Puppet, Ansible, or SaltStack?” The short answer is that we complement them. This article explains how we do this in some detail.
I couple of weeks ago, I gave my first ever talk at a security conference and had a great time at the Las Vegas B-sides conference (BsidesLV). I had a great time there, met some great people there. This note gives an overview of how it went, and gives a little information on how I give talks.