$ ./about
Polyglot
PHP, Go, Java, Python to DevOps across AWS, GCP & Terraform.
World Traveler
Visited 50 countries so far.
Tech Speaker
Speaker at various conferences and meetups.
Open Source
1.2k+ GitHub followers, active contributor.
$ cat stack.txt
$ ./articles
$ ls articles
Zero Trust in EKS: AWS IRSA & Supply Chain Security - Least Privilege & Trusted Images
Completing our Zero Trust in EKS series, this post focuses on securing North-South traffic using AWS IAM Roles for Service Accounts (IRSA) and establishing a robust software supply chain to ensure the integrity and trustworthiness of our container images.
Zero Trust in EKS: Network Isolation & Data Protection - Default Deny & Envelope Encryption
Beyond identity, a robust Zero Trust strategy for Amazon EKS demands stringent network isolation and comprehensive data protection. This post explores how to implement a 'Default Deny' network posture using Kubernetes Network Policies and safeguard sensitive data with AWS KMS Envelope Encryption and AWS Secrets Manager.
Zero Trust in EKS: Workload Identity with SPIFFE/SPIRE - The New Firewall
In a Zero Trust architecture, relying on network location for security is a relic of the past. This post delves into how SPIFFE/SPIRE provides cryptographically verifiable identities to workloads in Amazon EKS, enabling robust mutual TLS for East-West communication.