
Three penguins breaking stuff and (sometimes) fixing it.
Sharing practical experiences and lessons learned from securing cloud environments. Exploring Kubernetes, OpenStack, AWS, Azure, EntraID, and more.

Three penguins breaking stuff and (sometimes) fixing it.
Sharing practical experiences and lessons learned from securing cloud environments. Exploring Kubernetes, OpenStack, AWS, Azure, EntraID, and more.
The Logging Paradox Remember when I talked about Logging & Auditing as one of the 10 critical domains for K8s security? Well, hereās the thing nobody tells you: having logs is great, but having too many logs is almost as useless as having none. Picture this: youāre paying for a Splunk license šø (or your preferred log aggregation tool), and every day youāre shipping 600MB of control plane noise per node. Most of it? INFO-level messages about lease renewals and cache syncs that nobody will ever read. Itās like buying the latest iPhone and using it exclusively as a flashlight š¦. ...
The Boogeyman Under the Bed Letās be honest: Kubernetes security is that thing everyone knows they should care about but nobody wants to touch. Itās like flossing ā we all know itās important, but somehow we keep pushing it to next quarter. I recently had to pitch a comprehensive K8s security strategy to management, and spoiler alert: they actually liked it. Hereās the story of how I went from āKubernetes what?ā to āhereās our end-to-end security frameworkā without boring everyone to death (including myself). ...
These days Iām called sometimes Identity expert, sometimes āSMEā (subject matter expert). But I still consider myself a classic sysadmin. I usually find it funny people who use the āexpertā term so liberally, especially wide topics Networking, Infrastructure, Devops or the hot topic these days: AI. After more than 20 years of career I hardly feel myself expert on anything and I still consider that dedicated time, focus time, is a must to become an expert in something in particular. There would be lucky people who have been supported enough at work to develop their expertise in something in particular, but those like me who had to adapt their focus time based on business needs, hardly can focus more than 2/3 years in something in particular. ...
Welcome to Penwins! So youāre probably wondering: why penguins? Well, weāre three friends and former Linux sysadmins whoāve been securing (and occasionally breaking) cloud infrastructure for years. After countless late-night debugging sessions, cryptic error messages, and that one time we accidentally locked ourselves out of production (donāt ask), we figured we should write this stuff down. What Youāll Find Here What our bosses want us to talk about: Kubernetes Security: Best practices, network policies, RBAC configurations OpenStack Security: Securing private cloud deployments AWS & Azure: Cloud-native security implementations Identity Management: EntraID, LDAP, and IAM strategies Infrastructure as Code: Terraform, security scanning, and automation But this isnāt your typical ā10 Best Practicesā blog. Weāre here to share: ...