Tag:security policy
-
Dragon lizard downstream releases alinux and UOS became the first domestic OS officially supported by openscap
background Recently, Alibaba cloud Linux 2/3 (hereinafter referred to as alinux 2/3), the downstream distribution of Anolis OS, and uniontech OS server V20 (hereinafter referred to as UOS V20), the unified messaging software, have successively completed the product support integration with openscap, an internationally renowned security community, and have become the first batch of domestic […]
-
K8s security policy best practices
Author: Wan Hongming, kubesphere member, responsible for kubesphere security and multi tenant team As k8s is used more and more in production and test environments, more and more attention will be paid to security. Therefore, this article mainly shares the following contents for you: Understand the security risks faced by k8s environment Understand the security […]
-
Operate remote host docker command
Docker practice may require remote operation of docker commands, but due to security problems, this remote operation of docker is not adopted Modify file/lib/systemd/system/docker.service After execstart, add – H 0.0 0.0:8888sudo systemctl daemon-reloadsudo systemctl restart dockerThen use docker on another hostdocker -H 10.5.x.x:8888 ps -aSafety settings can be referencedhttp://www.sohu.com/a/76802346_355135Because I need to deploy the image […]
-
Spring security dry goods: how to implement different interfaces and different security policies
1. Preface Welcome to the spring security dry goods series. Recently, a development partner asked an interesting question. He is working on a project involving two styles. One is to interface small programs and use stateless securityJWT Token; The other is to manage the backgroundFreemarkerThat is, the front and rear ends are not separatedSessionMechanism. useSpring […]
-
Create react app scaffolding chrome plug-in project
background The previous article “local debugging scheme of front-end project” talked about developmentchromeExtension plug-in help completeCookieCopy to achieve local project debugging. But the plug-in is nativeJSDevelopment, this paper discusses how to introduce in the projectReact? Project practice First, execute the following command to initialize the project create-react-app chrome-extension –template typescript The project structure created is […]
-
Spring security: how to implement different interfaces and different security policies
1. Preface Welcome to readSpring security combat dry goodsA series of articles. Recently, an interesting question was raised by a small development partner. He is doing a project, involving two styles, one is to give small program interface, the use of stateless securityJWT TokenThe other is the management backgroundFreemarkerThat is, the front and rear ends […]
-
Android 8.1 security mechanism — seoandroid & SELinux
1. SELinux background knowledge 1.1 DAC and MAC Before SELinux appeared, the security model on Linux was called DAC, whose full name was discrete access control, translated as autonomous access control. The core idea of DAC is very simple, that is: the process theoretically has the same permissions as the user who executes it. For […]
-
Installing MySQL and configuration through homebrew
install Install MySQL:brew install mysql Start MySQL:mysql.server start Check MySQL service status:systemctl status mysql.service Security settings:myqsl_secure_installation, prompt security policy after execution: There are three levels of password validation policy: LOW Length >= 8 MEDIUM Length >= 8, numeric, mixed case, and special characters STRONG Length >= 8, numeric, mixed case, special characters and dictionary file […]
-
Using open policy agent to implement kubernetes pod security policy
Kubernetes is the most popular container choreography platform in today’s cloud native ecosystem. Therefore, the security of kubernetes has attracted more and more attention. In this blog post, I will first discuss the pod security policy admission controller. Then we’ll see how the open policy agent implements the pod security policy. In fact, open policy […]