Punk Security
  • home
  • services
  • tools
  • blog
  • events
  • about us
  • contact
01609 635 932

Using iam roles inside AWS Kubernetes

AWS managed Kubernetes (EKS) allows your pods to assume AWS iam roles automatically so you don’t have to handle pesky credentials.

Auditing Fortinets Github with SecretMagpie

SecretMagpie is our opensource secret detection tool, and in this article we walk you through using it against an organisation’s public repositories.

GitHub announces free secret scanning for public repos

GitHub announces free secret scanning for all public repositories.

Simplifying kubernetes network policies with cilium

Kubernetes network policies can be difficult to write but the free cilium editor makes it really simple

Auditing Kubernetes with rbac-police

Kubernetes pods can be abused to take over the entire Kubernetes cluster. rbac-police shows you which.

Applying Cyber Essentials scheme to CI/CD

The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?

  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
  • Cyber Essentials
  • Cyber Essential Plus
  • Armed Forces Covenant
  • ISO 27001
  • ISO 9001
  • CREST
  • Cyber Assurance Level 2
Punk Security

Copyright © 2026 Punk Security

Privacy | Terms of Use