Forem

# lazysre

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lazy SRE's guide to secure systems, part 5: the dev laptop is the perimeter
Cover image for Lazy SRE's guide to secure systems, part 5: the dev laptop is the perimeter

Lazy SRE's guide to secure systems, part 5: the dev laptop is the perimeter

Comments
8 min read
Lazy SRE's guide to secure systems, part 3: the unsexy list
Cover image for Lazy SRE's guide to secure systems, part 3: the unsexy list

Lazy SRE's guide to secure systems, part 3: the unsexy list

Comments
10 min read
Lazy SRE's guide to secure systems, part 1: the dependencies you didn't read
Cover image for Lazy SRE's guide to secure systems, part 1: the dependencies you didn't read

Lazy SRE's guide to secure systems, part 1: the dependencies you didn't read

Comments
7 min read
Lazy SRE's guide to secure systems, part 2: the actions you didn't pin
Cover image for Lazy SRE's guide to secure systems, part 2: the actions you didn't pin

Lazy SRE's guide to secure systems, part 2: the actions you didn't pin

Comments
8 min read
Lazy SRE's guide to secure systems, part 6: the network in front of everything
Cover image for Lazy SRE's guide to secure systems, part 6: the network in front of everything

Lazy SRE's guide to secure systems, part 6: the network in front of everything

Comments
9 min read
Lazy SRE's guide to secure systems, part 4: the four DNS records
Cover image for Lazy SRE's guide to secure systems, part 4: the four DNS records

Lazy SRE's guide to secure systems, part 4: the four DNS records

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.