{"id":280,"date":"2023-08-10T11:25:12","date_gmt":"2023-08-10T20:25:12","guid":{"rendered":"https:\/\/siekmann.cloud\/?p=280"},"modified":"2023-09-19T14:46:34","modified_gmt":"2023-09-19T23:46:34","slug":"episode-14-k8-misconfiguration-exposes-fortune-500s-data-the-reluctant-sysadmins-guide-to-securing-a-linux-server-john-maddog-halls-take-on-rhels-license-changes","status":"publish","type":"post","link":"https:\/\/siekmann.cloud\/?p=280","title":{"rendered":"Episode 14 &#8211; K8 misconfiguration exposes Fortune 500s\u2019 data, The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server, John maddog Hall\u2019s take on RHELs license changes"},"content":{"rendered":"<div class=\"powerpress_player\" id=\"powerpress_player_5901\"><audio class=\"wp-audio-shortcode\" id=\"audio-280-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3?_=1\" \/><a href=\"https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3\">https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3<\/a><\/audio><\/div><p class=\"powerpress_links powerpress_links_mp3\" style=\"margin-bottom: 1px !important;\">Podcast: <a href=\"https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3\" class=\"powerpress_link_pinw\" target=\"_blank\" title=\"Play in new window\" onclick=\"return powerpress_pinw('https:\/\/siekmann.cloud\/?powerpress_pinw=280-podcast');\" rel=\"nofollow\">Play in new window<\/a> | <a href=\"https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3\" class=\"powerpress_link_d\" title=\"Download\" rel=\"nofollow\" download=\"014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3\">Download<\/a> | <a href=\"#\" class=\"powerpress_link_e\" title=\"Embed\" onclick=\"return powerpress_show_embed('280-podcast');\" rel=\"nofollow\">Embed<\/a><\/p><p class=\"powerpress_embed_box\" id=\"powerpress_embed_280-podcast\" style=\"display: none;\"><input id=\"powerpress_embed_280-podcast_t\" type=\"text\" value=\"&lt;div class=&quot;powerpress_player&quot; id=&quot;powerpress_player_5902&quot;&gt;&lt;audio class=&quot;wp-audio-shortcode&quot; id=&quot;audio-280-2&quot; preload=&quot;none&quot; style=&quot;width: 100%;&quot; controls=&quot;controls&quot;&gt;&lt;source type=&quot;audio\/mpeg&quot; src=&quot;https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3?_=2&quot; \/&gt;&lt;a href=&quot;https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3&quot;&gt;https:\/\/siekmann.cloud\/wp-content\/uploads\/2023\/08\/014-Episode-14-K8-misconfig-exposes-Fortune-500s-data-The-Reluctant-Sysadmins-Guide-to-Securing-a-Linux-Server-John-maddog-Halls-take-on-RHELs-license-changes.mp3&lt;\/a&gt;&lt;\/audio&gt;&lt;\/div&gt;\" onclick=\"javascript: this.select();\" onfocus=\"javascript: this.select();\" style=\"width: 70%;\" readOnly><\/p>\n<ol class=\"wp-block-list\">\n<li><a href=\"tps:\/\/blog.aquasec.com\/kubernetes-exposed-one-yaml-away-from-disaster\" data-type=\"link\" data-id=\"tps:\/\/blog.aquasec.com\/kubernetes-exposed-one-yaml-away-from-disaster\">K8 misconfig exposes Fortune 500s\u2019 data<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/pboyd.io\/posts\/securing-a-linux-vm\/\">The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.lpi.org\/blog\/2023\/07\/30\/ibm-red-hat-and-free-software-an-old-maddogs-view\/\">John maddog Hall\u2019s take on RHELs license changes<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/linuxunplugged.com\">A podcast recommendation<\/a><\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">K8 misconfig exposes Fortune 500s\u2019 data<\/h1>\n\n\n\n<p>Professionally, I work in the security space, and because of that, I&#8217;m always interested in hearing about security issues, risks, attacks, or anything really going on in that space. So right now my Infosec exchange feed is full of people traveling to Vegas, of course and a lot of activities directed towards finding and reporting on security issues. One of the most forward companies in the K8 security space is <a href=\"https:\/\/www.aquasec.com\/\">Aqua Security<\/a>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server&nbsp;<\/h1>\n\n\n\n<p>Since we\u2019re talking about security already, why not cover the basics in case you\u2019re someone using a Linux server or workstation somewhere in your network. I am a huge fan of revisiting basics over and over again, just to make sure everyone is getting the same message, consistently and frequently. It deepens and freshens knowledge of any topic. Some call it wax on, wax off or sharpening the saw.<br>I recently came across <a href=\"https:\/\/pboyd.io\/posts\/securing-a-linux-vm\/\">The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server<\/a> and I think it has some great information and is very useful.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">John maddog Hall\u2019s take on RHELs license changes<\/h1>\n\n\n\n<p>Lots and lots has been written about Red Hat\u2019s changes in releasing source code for RHEL and I talked about it in the last show or two. As with everything, people are calming down after a frenzy of discussion and disagreements and the waters are calming a little bit. The distros competing with RHEL have made their business decisions and are moving on with their lives.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lpi.org\/blog\/2023\/07\/30\/ibm-red-hat-and-free-software-an-old-maddogs-view\/\">An assessment by John maddog Hall is worth noting in this discussion<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blog.aquasec.com\/kubernetes-exposed-one-yaml-away-from-disaster\">https:\/\/blog.aquasec.com\/kubernetes-exposed-one-yaml-away-from-disaster<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kubernetes.io\/docs\/tasks\/administer-cluster\/securing-a-cluster\/\">https:\/\/kubernetes.io\/docs\/tasks\/administer-cluster\/securing-a-cluster\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/media.defense.gov\/2022\/Aug\/29\/2003066362\/-1\/-1\/0\/CTR_KUBERNETES_HARDENING_GUIDANCE_1.2_20220829.PDF\">https:\/\/media.defense.gov\/2022\/Aug\/29\/2003066362\/-1\/-1\/0\/CTR_KUBERNETES_HARDENING_GUIDANCE_1.2_20220829.PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pboyd.io\/posts\/securing-a-linux-vm\/\">https:\/\/pboyd.io\/posts\/securing-a-linux-vm\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.lpi.org\/blog\/2023\/07\/30\/ibm-red-hat-and-free-software-an-old-maddogs-view\/\">https:\/\/www.lpi.org\/blog\/2023\/07\/30\/ibm-red-hat-and-free-software-an-old-maddogs-view\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/linuxunplugged.com\/about\">https:\/\/linuxunplugged.com\/about<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>K8 misconfig exposes Fortune 500s\u2019 data Professionally, I work in the security space, and because of that, I&#8217;m always interested in hearing about security issues, risks, attacks, or anything really going on in that space. So right now my Infosec exchange feed is full of people traveling to Vegas, of course and a lot of activities directed towards finding and reporting on security issues. One of the most forward companies in the K8 security space is Aqua Security. The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server&nbsp; Since we\u2019re talking about security already, why not cover the basics in case you\u2019re someone using a Linux server or workstation somewhere in your network. I am a huge fan of revisiting basics over and over again, just to make sure everyone is getting the same message, consistently and frequently. It deepens and freshens knowledge of any topic. Some call it wax on,&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/siekmann.cloud\/?p=280\">Continue Reading<span class=\"screen-reader-text\">Episode 14 &#8211; K8 misconfiguration exposes Fortune 500s\u2019 data, The Reluctant Sysadmin&#8217;s Guide to Securing a Linux Server, John maddog Hall\u2019s take on RHELs license changes<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[37,35,36,28,29],"class_list":["post-280","post","type-post","status-publish","format-standard","hentry","category-podcast","tag-api-server","tag-aquasecurity","tag-k8","tag-linux","tag-rhel","entry"],"_links":{"self":[{"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/posts\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=280"}],"version-history":[{"count":1,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/posts\/280\/revisions"}],"predecessor-version":[{"id":281,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=\/wp\/v2\/posts\/280\/revisions\/281"}],"wp:attachment":[{"href":"https:\/\/siekmann.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/siekmann.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}