<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>systemshardening.com</title>
  <subtitle>Hardening real systems in production, for engineers who actually run them.</subtitle>
  <link href="https://www.systemshardening.com/feed.xml" rel="self" type="application/atom+xml"/>
  <link href="https://www.systemshardening.com/" rel="alternate" type="text/html"/>
  <id>https://www.systemshardening.com/</id>
  <author>
    <name>Systems Hardening</name>
  </author>
  <updated>2026-04-29T00:00:00.000Z</updated>
  
  <entry>
    <title>AI Agent Observability and Tracing: OpenTelemetry for Agent Runs and Tool Calls</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-agent-observability/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-agent-observability/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Agent Observability and Tracing: OpenTelemetry for Agent Runs and Tool Calls
Problem
A production AI agent’s single run involves:

Multiple model calls (planner, executor, summarizer).
Tool...</summary>
  </entry>
  
  <entry>
    <title>AI Model Output Watermarking: Provenance for Generated Text and Code</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-output-watermarking/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-output-watermarking/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Model Output Watermarking: Provenance for Generated Text and Code
Problem
C2PA signs media files at creation. It works for images and video — the manifest sits in metadata, the signature is...</summary>
  </entry>
  
  <entry>
    <title>Continuous AI Red-Teaming Pipelines: Automated Adversarial Testing in CI</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/continuous-red-teaming/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/continuous-red-teaming/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Continuous AI Red-Teaming Pipelines: Automated Adversarial Testing in CI
Problem
Most AI security investment goes into one-off red-team engagements: a security firm runs adversarial prompts against...</summary>
  </entry>
  
  <entry>
    <title>Just-in-Time CI Access for Production Deploys: Approval Flows and Bounded Permissions</title>
    <link href="https://www.systemshardening.com/articles/cicd/jit-ci-access/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/jit-ci-access/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Just-in-Time CI Access for Production Deploys: Approval Flows and Bounded Permissions
Problem
CI / CD pipelines that deploy to production typically have standing access: an IAM role, a Vault token, a...</summary>
  </entry>
  
  <entry>
    <title>Renovate and Dependabot Security Configuration: Auto-Merge Boundaries and Scope Rules</title>
    <link href="https://www.systemshardening.com/articles/cicd/renovate-dependabot-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/renovate-dependabot-security/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Renovate and Dependabot Security Configuration: Auto-Merge Boundaries and Scope Rules
Problem
Dependency-update bots — Renovate, Dependabot — solve a real problem. Without them, dependencies stagnate;...</summary>
  </entry>
  
  <entry>
    <title>GitHub Apps vs PATs vs Deploy Keys vs OIDC: Choosing the Right SCM Identity</title>
    <link href="https://www.systemshardening.com/articles/cicd/scm-identity-choice/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/scm-identity-choice/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>GitHub Apps vs PATs vs Deploy Keys vs OIDC: Choosing the Right SCM Identity
Problem
Every team integrating with GitHub (or GitLab, with analogous mechanisms) has at least one credential question per...</summary>
  </entry>
  
  <entry>
    <title>API Key Lifecycle at Scale: Issuance, Rotation, Scoping, and Audit Across Cloud and SaaS</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/api-key-lifecycle/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/api-key-lifecycle/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>API Key Lifecycle at Scale: Issuance, Rotation, Scoping, and Audit Across Cloud and SaaS
Problem
API keys leak. The 2024 GitGuardian “State of Secrets Sprawl” report found 23+ million secrets exposed...</summary>
  </entry>
  
  <entry>
    <title>Production Access Management with Teleport and Boundary: Brokered, Recorded, Auditable Access</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/production-access-management/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/production-access-management/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Production Access Management with Teleport and Boundary: Brokered, Recorded, Auditable Access
Problem
Operator access to production hosts has long been a structural weakness:

Static SSH keys...</summary>
  </entry>
  
  <entry>
    <title>Tabletop Exercises and Chaos Security Drills: Building, Running, and Acting on Findings</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/tabletop-exercises/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/tabletop-exercises/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Tabletop Exercises and Chaos Security Drills: Building, Running, and Acting on Findings
Problem
Real security incidents happen at 3 AM, with incomplete information, in systems people half-remember,...</summary>
  </entry>
  
  <entry>
    <title>CSI Driver Security: Volume-Mount Hardening, Privileged Drivers, and Inline Ephemeral Volumes</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/csi-driver-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/csi-driver-security/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>CSI Driver Security: Volume-Mount Hardening, Privileged Drivers, and Inline Ephemeral Volumes
Problem
The Container Storage Interface (CSI) is the standard mechanism for attaching storage to...</summary>
  </entry>
  
  <entry>
    <title>External Secrets Operator: Pulling Secrets from KMS, Vault, and Cloud Stores into Kubernetes</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/external-secrets-operator/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/external-secrets-operator/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>External Secrets Operator: Pulling Secrets from KMS, Vault, and Cloud Stores into Kubernetes
Problem
Native Kubernetes Secrets are convenient and dangerous. They’re base64 strings sitting in etcd;...</summary>
  </entry>
  
  <entry>
    <title>Native Sidecar Containers in Kubernetes 1.29+: Lifecycle, Security, and Mesh Migration</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/native-sidecar-containers/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/native-sidecar-containers/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Native Sidecar Containers in Kubernetes 1.29+: Lifecycle, Security, and Mesh Migration
Problem
The classic sidecar pattern — a container in the same Pod as the application that handles cross-cutting...</summary>
  </entry>
  
  <entry>
    <title>dm-verity and dm-integrity: Tamper-Evident Block-Level Roots for Production Linux</title>
    <link href="https://www.systemshardening.com/articles/linux/dm-verity/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/dm-verity/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>dm-verity and dm-integrity: Tamper-Evident Block-Level Roots for Production Linux
Problem
Filesystem-level integrity (auditd, AIDE, Tripwire) is too late. A check that runs after boot has already let...</summary>
  </entry>
  
  <entry>
    <title>eBPF-LSM (lsm_bpf): Kernel Security Policy as Hot-Loadable BPF Programs</title>
    <link href="https://www.systemshardening.com/articles/linux/ebpf-lsm/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/ebpf-lsm/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>eBPF-LSM (lsm_bpf): Kernel Security Policy as Hot-Loadable BPF Programs
Problem
Linux Security Modules (LSMs) — AppArmor, SELinux, Smack — define security policy at kernel hooks: every file open,...</summary>
  </entry>
  
  <entry>
    <title>USBGuard: USB Device Authorization on Production Linux Hosts</title>
    <link href="https://www.systemshardening.com/articles/linux/usbguard/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/usbguard/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>USBGuard: USB Device Authorization on Production Linux Hosts
Problem
Most production Linux hosts default-trust every USB device. The kernel sees a new device, asks the bus to enumerate it, then loads...</summary>
  </entry>
  
  <entry>
    <title>HAProxy Production Hardening: Beyond TLS, Request Filtering, ACLs, and Logging Hygiene</title>
    <link href="https://www.systemshardening.com/articles/network/haproxy-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/haproxy-hardening/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>HAProxy Production Hardening: Beyond TLS, Request Filtering, ACLs, and Logging Hygiene
Problem
HAProxy is the workhorse load balancer for many large internet properties — Stack Overflow, Reddit,...</summary>
  </entry>
  
  <entry>
    <title>Service Mesh Egress Gateway Patterns: Bounded Outbound Traffic in Istio Clusters</title>
    <link href="https://www.systemshardening.com/articles/network/istio-egress-gateway/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/istio-egress-gateway/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Service Mesh Egress Gateway Patterns: Bounded Outbound Traffic in Istio Clusters
Problem
Outbound traffic from a Kubernetes cluster is a tangled topic. By default Istio’s sidecar proxies forward...</summary>
  </entry>
  
  <entry>
    <title>WireGuard Mesh for Internal Zero-Trust Networking: wg-quick, Tailscale, Netbird Compared</title>
    <link href="https://www.systemshardening.com/articles/network/wireguard-mesh/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/wireguard-mesh/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>WireGuard Mesh for Internal Zero-Trust Networking: wg-quick, Tailscale, Netbird Compared
Problem
Internal networks at small-to-medium organizations have a recurring shape: a few cloud VPCs, a few...</summary>
  </entry>
  
  <entry>
    <title>Alert Deduplication and Correlation Patterns: Beating Alert Fatigue at Scale</title>
    <link href="https://www.systemshardening.com/articles/observability/alert-correlation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/alert-correlation/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Alert Deduplication and Correlation Patterns: Beating Alert Fatigue at Scale
Problem
A medium-sized organization’s SOC ingests 5,000-50,000 alerts per day across SIEM, EDR, IDS, cloud-provider...</summary>
  </entry>
  
  <entry>
    <title>Forensic Readiness: Log Retention, Capture, and Chain of Custody for Incident Response</title>
    <link href="https://www.systemshardening.com/articles/observability/forensic-readiness/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/forensic-readiness/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Forensic Readiness: Log Retention, Capture, and Chain of Custody for Incident Response
Problem
When an incident happens, the question isn’t “what’s our SIEM doing right now?” It’s “what data do we...</summary>
  </entry>
  
  <entry>
    <title>Security SLOs and Error Budgets: SRE Discipline Applied to Detection and Response</title>
    <link href="https://www.systemshardening.com/articles/observability/security-slos/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/security-slos/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Security SLOs and Error Budgets: SRE Discipline Applied to Detection and Response
Problem
Engineering organizations adopted SRE-style SLOs (service-level objectives) and error budgets a decade ago....</summary>
  </entry>
  
  <entry>
    <title>WASM Cold-Start Optimization for Security Workloads: Pre-Compilation, Snapshots, and AOT</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-cold-start/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-cold-start/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Cold-Start Optimization for Security Workloads: Pre-Compilation, Snapshots, and AOT
Problem
Security-relevant WASM workloads run on the request hot path: auth filters, policy decisions, content...</summary>
  </entry>
  
  <entry>
    <title>WASM in IoT and Embedded Production: wasmEdge, wasm3, WAMR, and OTA Update Security</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-iot-embedded/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-iot-embedded/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM in IoT and Embedded Production: wasmEdge, wasm3, WAMR, and OTA Update Security
Problem
Edge and IoT deployments — industrial gateways, vehicle ECUs, smart appliances, building-automation...</summary>
  </entry>
  
  <entry>
    <title>WASM Plugin Architecture Threat Modeling: Trust Boundaries, Host-API Exposure, and Supply Chain</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-plugin-threat-modeling/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-plugin-threat-modeling/</id>
    <published>2026-04-29T00:00:00.000Z</published>
    <updated>2026-04-29T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Plugin Architecture Threat Modeling: Trust Boundaries, Host-API Exposure, and Supply Chain
Problem
WASM is the lingua franca for plugin systems in 2026: Envoy plugins, NGINX filters, Postgres...</summary>
  </entry>
  
  <entry>
    <title>C2PA Content Credentials: Cryptographic Provenance for AI-Generated Media in Production</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/c2pa-content-credentials/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/c2pa-content-credentials/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>C2PA Content Credentials: Cryptographic Provenance for AI-Generated Media in Production
Problem
Generative models produce images, video, and audio that pass as authentic camera output. The...</summary>
  </entry>
  
  <entry>
    <title>MCP Authentication Patterns: OAuth 2.1, Capability Tokens, and Per-Tool Authorization</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/mcp-authentication/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/mcp-authentication/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>MCP Authentication Patterns: OAuth 2.1, Capability Tokens, and Per-Tool Authorization
Problem
Model Context Protocol (MCP) servers expose tools, resources, and prompts to LLM clients. An agent backed...</summary>
  </entry>
  
  <entry>
    <title>Prompt Cache Security: Side-Channels, Poisoning, and Tenant Isolation in LLM Provider Caches</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/prompt-cache-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/prompt-cache-security/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Prompt Cache Security: Side-Channels, Poisoning, and Tenant Isolation in LLM Provider Caches
Problem
Major LLM providers introduced prompt caching in 2024-2025. Anthropic’s prompt caching (GA in...</summary>
  </entry>
  
  <entry>
    <title>Ephemeral CI Runners with Firecracker and Kata: VM-Level Isolation for Build Jobs</title>
    <link href="https://www.systemshardening.com/articles/cicd/firecracker-kata-ci-runners/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/firecracker-kata-ci-runners/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Ephemeral CI Runners with Firecracker and Kata: VM-Level Isolation for Build Jobs
Problem
Self-hosted CI runners are typically Linux containers (GitHub Actions Runner Controller, GitLab Runner with...</summary>
  </entry>
  
  <entry>
    <title>OIDC Federation Hardening: Locking Down CI-to-Cloud Trust Policies</title>
    <link href="https://www.systemshardening.com/articles/cicd/oidc-federation-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/oidc-federation-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>OIDC Federation Hardening: Locking Down CI-to-Cloud Trust Policies
Problem
OIDC federation between CI providers (GitHub Actions, GitLab, CircleCI, Buildkite) and cloud providers (AWS, GCP, Azure)...</summary>
  </entry>
  
  <entry>
    <title>Branch Protection and Repository Policy as Code: Terraform GitHub for Hundreds of Repos</title>
    <link href="https://www.systemshardening.com/articles/cicd/repo-policy-as-code/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/repo-policy-as-code/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Branch Protection and Repository Policy as Code: Terraform GitHub for Hundreds of Repos
Problem
Branch protection — required reviewers, status checks, push restrictions, signed commits — is the gate...</summary>
  </entry>
  
  <entry>
    <title>Secrets Rotation Orchestration: Coordinating Vault, KMS, OIDC, and Database Credentials</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/secrets-rotation-orchestration/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/secrets-rotation-orchestration/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Secrets Rotation Orchestration: Coordinating Vault, KMS, OIDC, and Database Credentials
Problem
Rotation is the operation that matters most for credential security and most likely to cause an outage....</summary>
  </entry>
  
  <entry>
    <title>SPIFFE and SPIRE for Workload Identity Across Clusters and Clouds</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/spiffe-spire-workload-identity/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/spiffe-spire-workload-identity/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>SPIFFE and SPIRE for Workload Identity Across Clusters and Clouds
Problem
Workloads need to authenticate to other workloads. The dominant patterns each have a structural problem:

Shared API keys /...</summary>
  </entry>
  
  <entry>
    <title>Threat Modeling at Scale: STRIDE-per-Component, PASTA, and Continuous Threat Modeling</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/threat-modeling-at-scale/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/threat-modeling-at-scale/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Threat Modeling at Scale: STRIDE-per-Component, PASTA, and Continuous Threat Modeling
Problem
Threat modeling has been an industry-standard practice for two decades. Yet at most engineering...</summary>
  </entry>
  
  <entry>
    <title>Confidential Containers on Kubernetes: AMD SEV-SNP, Intel TDX, and the Attestation Flow</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/confidential-containers/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/confidential-containers/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Confidential Containers on Kubernetes: AMD SEV-SNP, Intel TDX, and the Attestation Flow
Problem
Standard container isolation depends on the host kernel. seccomp, AppArmor, capabilities, user...</summary>
  </entry>
  
  <entry>
    <title>User Namespaces for Pods: UID Remapping, Container Escape Defense, and the GA Path in Kubernetes 1.30+</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/user-namespaces-pods/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/user-namespaces-pods/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>User Namespaces for Pods: UID Remapping, Container Escape Defense, and the GA Path in Kubernetes 1.30+
Problem
Container security has long had an awkward asymmetry. A Pod’s container that runs as root...</summary>
  </entry>
  
  <entry>
    <title>ValidatingAdmissionPolicy with CEL: Native Kubernetes Admission Without Webhooks</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/validating-admission-policy-cel/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/validating-admission-policy-cel/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>ValidatingAdmissionPolicy with CEL: Native Kubernetes Admission Without Webhooks
Problem
Webhook-based admission control (Kyverno, Gatekeeper, OPA, custom webhooks) has been the dominant pattern for...</summary>
  </entry>
  
  <entry>
    <title>FIDO2 SSH with sk-* Keys: Hardware-Backed Authentication for Production Hosts</title>
    <link href="https://www.systemshardening.com/articles/linux/fido2-ssh/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/fido2-ssh/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>FIDO2 SSH with sk-* Keys: Hardware-Backed Authentication for Production Hosts
Problem
Standard SSH keys live on disk. The private key is a file: ~/.ssh/id_ed25519. Anything that can read that file (a...</summary>
  </entry>
  
  <entry>
    <title>Kernel Lockdown Mode: Blocking Root from Modifying the Running Kernel</title>
    <link href="https://www.systemshardening.com/articles/linux/kernel-lockdown/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/kernel-lockdown/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Kernel Lockdown Mode: Blocking Root from Modifying the Running Kernel
Problem
Root traditionally has unrestricted access to the running kernel: load and unload modules, write to /dev/mem and...</summary>
  </entry>
  
  <entry>
    <title>Landlock LSM: Unprivileged Kernel Sandboxing for Production Linux Applications</title>
    <link href="https://www.systemshardening.com/articles/linux/landlock-lsm/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/landlock-lsm/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Landlock LSM: Unprivileged Kernel Sandboxing for Production Linux Applications
Problem
Linux has had application sandboxing for two decades. Every existing option requires either privilege or...</summary>
  </entry>
  
  <entry>
    <title>eBPF-XDP for L4 DDoS Mitigation: Line-Rate Drop in the Kernel</title>
    <link href="https://www.systemshardening.com/articles/network/ebpf-xdp-ddos/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/ebpf-xdp-ddos/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>eBPF-XDP for L4 DDoS Mitigation: Line-Rate Drop in the Kernel
Problem
Layer-4 floods (SYN flood, UDP amplification, raw packet floods at &amp;gt;1 Mpps) overwhelm a server long before the application gets...</summary>
  </entry>
  
  <entry>
    <title>Encrypted Client Hello (ECH) Deployment on NGINX, Cloudflare, and Internal Edges</title>
    <link href="https://www.systemshardening.com/articles/network/encrypted-client-hello/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/encrypted-client-hello/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Encrypted Client Hello (ECH) Deployment on NGINX, Cloudflare, and Internal Edges
Problem
TLS 1.3 encrypts everything in the handshake except one critical field: the Server Name Indication (SNI). The...</summary>
  </entry>
  
  <entry>
    <title>HTTP/2 RST and CONTINUATION Flood Mitigation: CVE-2023-44487, CVE-2024-27316, and Beyond</title>
    <link href="https://www.systemshardening.com/articles/network/http2-flood-mitigation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/http2-flood-mitigation/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>HTTP/2 RST and CONTINUATION Flood Mitigation: CVE-2023-44487, CVE-2024-27316, and Beyond
Problem
HTTP/2 multiplexes many streams over a single TCP connection. The protocol’s design — streams created...</summary>
  </entry>
  
  <entry>
    <title>Detection Engineering Metrics: MTTD, MTTR, Signal-to-Noise, and Coverage Tracking</title>
    <link href="https://www.systemshardening.com/articles/observability/detection-engineering-metrics/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/detection-engineering-metrics/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Detection Engineering Metrics: MTTD, MTTR, Signal-to-Noise, and Coverage Tracking
Problem
Detection programs accumulate rules over time. A team starts with a handful of carefully-crafted detections;...</summary>
  </entry>
  
  <entry>
    <title>OpenTelemetry PII Leakage: Stopping Sensitive Data in Span Attributes, Baggage, and Logs</title>
    <link href="https://www.systemshardening.com/articles/observability/otel-pii-leakage/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/otel-pii-leakage/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>OpenTelemetry PII Leakage: Stopping Sensitive Data in Span Attributes, Baggage, and Logs
Problem
OpenTelemetry instrumentation, when applied with the default auto-instrumentation libraries, produces...</summary>
  </entry>
  
  <entry>
    <title>SIEM Cost Optimization: Cardinality, Retention, Sampling, and Index-Tier Strategy</title>
    <link href="https://www.systemshardening.com/articles/observability/siem-cost-optimization/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/siem-cost-optimization/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>SIEM Cost Optimization: Cardinality, Retention, Sampling, and Index-Tier Strategy
Problem
SIEM bills follow a predictable trajectory: a vendor-pitched price quote at signing; a 2x increase the...</summary>
  </entry>
  
  <entry>
    <title>Edge Runtime WASM Hardening: Cloudflare Workers, Fastly Compute, and Multi-Tenant Isolation</title>
    <link href="https://www.systemshardening.com/articles/wasm/edge-wasm-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/edge-wasm-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>Edge Runtime WASM Hardening: Cloudflare Workers, Fastly Compute, and Multi-Tenant Isolation
Problem
Edge runtimes (Cloudflare Workers, Fastly Compute@Edge, Deno Deploy, Wasmer Edge, Vercel Edge...</summary>
  </entry>
  
  <entry>
    <title>Envoy and Istio WASM Plugin Hardening: Resource Limits, ABI Selection, and Distribution</title>
    <link href="https://www.systemshardening.com/articles/wasm/envoy-wasm-plugin-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/envoy-wasm-plugin-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>Envoy and Istio WASM Plugin Hardening: Resource Limits, ABI Selection, and Distribution
Problem
Envoy’s WASM extension model lets operators inject custom logic into the request path: header rewriting,...</summary>
  </entry>
  
  <entry>
    <title>NGINX WASM Filters with ngx_wasm_module: Request-Path Plugins, Resource Caps, and Distribution</title>
    <link href="https://www.systemshardening.com/articles/wasm/nginx-wasm-filters/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/nginx-wasm-filters/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>NGINX WASM Filters with ngx_wasm_module: Request-Path Plugins, Resource Caps, and Distribution
Problem
NGINX has had ngx_http_lua_module and njs for years; both let operators inject custom logic into...</summary>
  </entry>
  
  <entry>
    <title>Reproducible WASM Builds and SBOM Generation: Deterministic Compilation, CycloneDX, In-Toto Attestations</title>
    <link href="https://www.systemshardening.com/articles/wasm/reproducible-wasm-builds/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/reproducible-wasm-builds/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>Reproducible WASM Builds and SBOM Generation: Deterministic Compilation, CycloneDX, In-Toto Attestations
Problem
Reproducible builds — the property that the same source produces the same binary...</summary>
  </entry>
  
  <entry>
    <title>WASI HTTP Server Hardening: Production Patterns for wasi:http/incoming-handler</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasi-http-server-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasi-http-server-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASI HTTP Server Hardening: Production Patterns for wasi:http/incoming-handler
Problem
wasi:http/incoming-handler is the WASI Preview 2 interface for serving HTTP. A component implements...</summary>
  </entry>
  
  <entry>
    <title>WASI Preview 2 Capability-Based Security: filesystem, sockets, http, and the Component Model</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasi-preview-2-capabilities/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasi-preview-2-capabilities/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASI Preview 2 Capability-Based Security: filesystem, sockets, http, and the Component Model
Problem
WASI Preview 1 (the original system interface from 2019) modeled the world as a small flat...</summary>
  </entry>
  
  <entry>
    <title>WASI Sockets API Hardening: TCP, UDP, and TLS Capability Scoping for Network-Bound WASM</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasi-sockets-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasi-sockets-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASI Sockets API Hardening: TCP, UDP, and TLS Capability Scoping for Network-Bound WASM
Problem
WASI Preview 2 introduced wasi:sockets/tcp and wasi:sockets/udp — interfaces that let WASM modules...</summary>
  </entry>
  
  <entry>
    <title>WASM AI Inference: Isolating ONNX Runtime Web, llama.cpp WASM, and On-Device Models</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-ai-inference/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-ai-inference/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM AI Inference: Isolating ONNX Runtime Web, llama.cpp WASM, and On-Device Models
Problem
AI inference has historically run on GPUs in dedicated services. By 2026, a parallel pattern has emerged:...</summary>
  </entry>
  
  <entry>
    <title>WASM Component Model Security Boundaries: Composition, Capability Passing, and Trust Decisions</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-component-model-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-component-model-security/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Component Model Security Boundaries: Composition, Capability Passing, and Trust Decisions
Problem
The component model turns WebAssembly into a composition primitive. A component is a...</summary>
  </entry>
  
  <entry>
    <title>WASM in Databases: pg_wasm, ClickHouse UDFs, SurrealDB Extensions</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-in-databases/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-in-databases/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM in Databases: pg_wasm, ClickHouse UDFs, SurrealDB Extensions
Problem
Databases run user-supplied logic. Postgres has stored procedures (PL/pgSQL, PL/Python, PL/Perl, PL/Rust). ClickHouse has...</summary>
  </entry>
  
  <entry>
    <title>WASM Multi-Tenancy Patterns: Resource Quotas, Fair Scheduling, and Tenant Isolation Failures</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-multi-tenancy/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-multi-tenancy/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Multi-Tenancy Patterns: Resource Quotas, Fair Scheduling, and Tenant Isolation Failures
Problem
Running multiple tenants’ WASM workloads in a single runtime instance is the hard case for WASM...</summary>
  </entry>
  
  <entry>
    <title>OCI WASM Module Signing and Verification: cosign, notation, and Admission-Time Enforcement</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-oci-signing/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-oci-signing/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>OCI WASM Module Signing and Verification: cosign, notation, and Admission-Time Enforcement
Problem
WebAssembly modules are distributed through OCI registries — the same ghcr.io, quay.io, docker.io,...</summary>
  </entry>
  
  <entry>
    <title>WASM Workloads on Kubernetes: runwasi, Spin, and the Threat Model Shift from OCI Containers</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-on-kubernetes/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-on-kubernetes/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Workloads on Kubernetes: runwasi, Spin, and the Threat Model Shift from OCI Containers
Problem
WebAssembly workloads now run on Kubernetes the same way containers do: a Pod manifest, an OCI...</summary>
  </entry>
  
  <entry>
    <title>WASM Module Static Analysis and Vulnerability Scanning: wasm-tools, twiggy, and CVE Detection</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasm-static-analysis/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasm-static-analysis/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>WASM Module Static Analysis and Vulnerability Scanning: wasm-tools, twiggy, and CVE Detection
Problem
Container scanning is a mature ecosystem: Trivy, Grype, Snyk, Anchore, and many others ingest...</summary>
  </entry>
  
  <entry>
    <title>Wasmtime Production Hardening: Fuel, Memory, Epoch Interrupts, and WASI Capability Allowlists</title>
    <link href="https://www.systemshardening.com/articles/wasm/wasmtime-production-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wasmtime-production-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>Wasmtime Production Hardening: Fuel, Memory, Epoch Interrupts, and WASI Capability Allowlists
Problem
Wasmtime is the most widely-deployed standalone WebAssembly runtime — used inside Spin, wasmCloud,...</summary>
  </entry>
  
  <entry>
    <title>Wazero Hardening for Go Embedders: Resource Limits, WASI Capabilities, and Plugin Isolation</title>
    <link href="https://www.systemshardening.com/articles/wasm/wazero-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/wasm/wazero-hardening/</id>
    <published>2026-04-27T00:00:00.000Z</published>
    <updated>2026-04-27T00:00:00.000Z</updated>
    <category term="wasm"/>
    <summary>Wazero Hardening for Go Embedders: Resource Limits, WASI Capabilities, and Plugin Isolation
Problem
Wazero is a WebAssembly runtime written entirely in Go, with no CGo and no external dependencies. By...</summary>
  </entry>
  
  <entry>
    <title>Agent Memory Poisoning: Defending the Persistence Layer of Long-Running LLM Agents</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/agent-memory-poisoning/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/agent-memory-poisoning/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Agent Memory Poisoning: Defending the Persistence Layer of Long-Running LLM Agents
Problem
Long-running agents need memory. Without it, every session starts from scratch — the agent cannot recall user...</summary>
  </entry>
  
  <entry>
    <title>CI/CD Pipeline Egress Control: Runner Network Isolation, Allowlists, and Supply-Chain Exfiltration Defense</title>
    <link href="https://www.systemshardening.com/articles/cicd/pipeline-egress-control/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/pipeline-egress-control/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>CI/CD Pipeline Egress Control: Runner Network Isolation, Allowlists, and Supply-Chain Exfiltration Defense
Problem
A typical CI/CD runner has:

The repository’s full source, including any embedded...</summary>
  </entry>
  
  <entry>
    <title>Post-Quantum Crypto Migration Plan: Hybrid TLS, SSH, Code Signing, and Encryption at Rest</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/post-quantum-migration/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/post-quantum-migration/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Post-Quantum Crypto Migration Plan: Hybrid TLS, SSH, Code Signing, and Encryption at Rest
Problem
Shor’s algorithm breaks RSA, DSA, and elliptic-curve cryptography in polynomial time on a sufficiently...</summary>
  </entry>
  
  <entry>
    <title>Gateway API Security Patterns: Multi-Team Routing, ReferenceGrant, and Delegated Trust on Kubernetes</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/gateway-api-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/gateway-api-security/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Gateway API Security Patterns: Multi-Team Routing, ReferenceGrant, and Delegated Trust on Kubernetes
Problem
Kubernetes Ingress has a single resource type and a single implicit trust model: whoever...</summary>
  </entry>
  
  <entry>
    <title>io_uring Security and Hardening: Disabling, Restricting, and Auditing a Bypass-Prone Syscall Interface</title>
    <link href="https://www.systemshardening.com/articles/linux/io-uring-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/io-uring-hardening/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>io_uring Security and Hardening: Disabling, Restricting, and Auditing a Bypass-Prone Syscall Interface
Problem
io_uring is a high-performance asynchronous I/O interface introduced in Linux 5.1....</summary>
  </entry>
  
  <entry>
    <title>HTTP/3 and QUIC Production Hardening: UDP Amplification, 0-RTT Replay, and Connection ID Privacy</title>
    <link href="https://www.systemshardening.com/articles/network/http3-quic-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/http3-quic-hardening/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>HTTP/3 and QUIC Production Hardening: UDP Amplification, 0-RTT Replay, and Connection ID Privacy
Problem
QUIC (RFC 9000) replaces TCP+TLS+HTTP/2 with an integrated transport that encrypts both the...</summary>
  </entry>
  
  <entry>
    <title>Detection-as-Code with Sigma: Versioned, Tested, Vendor-Neutral SIEM Rules</title>
    <link href="https://www.systemshardening.com/articles/observability/detection-as-code-sigma/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/detection-as-code-sigma/</id>
    <published>2026-04-24T00:00:00.000Z</published>
    <updated>2026-04-24T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Detection-as-Code with Sigma: Versioned, Tested, Vendor-Neutral SIEM Rules
Problem
Most security teams maintain detection logic in three incompatible places: the SIEM’s rule editor (Splunk SPL,...</summary>
  </entry>
  
  <entry>
    <title>AI-Adaptive Malware: How Modern Payloads Change Behaviour Based on Their Environment and How to Defend Against Them</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-adaptive-malware-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-adaptive-malware-defence/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI-Adaptive Malware: How Modern Payloads Change Behaviour Based on Their Environment and How to Defend Against Them
Problem
A virus in 2020 was a static binary. It had one payload, one persistence...</summary>
  </entry>
  
  <entry>
    <title>Running AI-Powered Security Assessments on Your Own Infrastructure: Using Frontier Models Before Attackers Do</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-powered-security-assessments/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-powered-security-assessments/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Running AI-Powered Security Assessments on Your Own Infrastructure: Using Frontier Models Before Attackers Do
Problem
Anthropic announced that Mythos is significantly better at discovering cyber...</summary>
  </entry>
  
  <entry>
    <title>Defending Against AI-Amplified Social Engineering: Phishing, Voice Cloning, and Deepfake Impersonation</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-social-engineering-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-social-engineering-defence/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Defending Against AI-Amplified Social Engineering: Phishing, Voice Cloning, and Deepfake Impersonation
Problem
Every traditional indicator of phishing is gone.
In 2020, a phishing email was...</summary>
  </entry>
  
  <entry>
    <title>Mythos and the Vulnerability Classes AI Finds First: Eliminating Your Highest-Risk Attack Surface</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/mythos-proactive-attack-surface-reduction/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/mythos-proactive-attack-surface-reduction/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Mythos and the Vulnerability Classes AI Finds First: Eliminating Your Highest-Risk Attack Surface
Problem
Anthropic announced that Mythos, their frontier AI model, is significantly better at...</summary>
  </entry>
  
  <entry>
    <title>Software Supply Chain and Third-Party Exposure: Defending Against Upstream Compromise</title>
    <link href="https://www.systemshardening.com/articles/cicd/software-supply-chain-third-party-risk/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/software-supply-chain-third-party-risk/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Software Supply Chain and Third-Party Exposure: Defending Against Upstream Compromise
Problem
The most efficient way to compromise 10,000 organisations is to compromise one library they all depend...</summary>
  </entry>
  
  <entry>
    <title>Identity Abuse and Credential Compromise: Defending Against Attackers Who Log In Instead of Break In</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/identity-abuse-credential-compromise/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/identity-abuse-credential-compromise/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Identity Abuse and Credential Compromise: Defending Against Attackers Who Log In Instead of Break In
Problem
The primary intrusion method has shifted. By 2026, nearly 80% of detected intrusions are...</summary>
  </entry>
  
  <entry>
    <title>Ransomware 3.0 and Multi-Stage Extortion: Defence, Detection, and Recovery</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/ransomware-multi-extortion-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/ransomware-multi-extortion-defence/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Ransomware 3.0 and Multi-Stage Extortion: Defence, Detection, and Recovery
Problem
Ransomware in 2020 was straightforward: encrypt the victim’s files, demand payment for the decryption key. If you had...</summary>
  </entry>
  
  <entry>
    <title>LLMs on Kubernetes: Understanding the Threat Model and Deploying an LLM Gateway</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/llm-kubernetes-threat-model/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/llm-kubernetes-threat-model/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>LLMs on Kubernetes: Understanding the Threat Model and Deploying an LLM Gateway
Problem
A standard Ollama deployment on Kubernetes looks operationally sound: pods are healthy, readiness probes pass,...</summary>
  </entry>
  
  <entry>
    <title>Secure Cloud VM Access: SSH Key Authentication, Two-Factor Login, VPN, and Audit Logging</title>
    <link href="https://www.systemshardening.com/articles/linux/secure-cloud-vm-access/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/secure-cloud-vm-access/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Secure Cloud VM Access: SSH Key Authentication, Two-Factor Login, VPN, and Audit Logging
Problem
A cloud VM with SSH exposed on port 22 to the public internet receives thousands of brute-force login...</summary>
  </entry>
  
  <entry>
    <title>DDoS Megascale Operations: Defending Against AI-Orchestrated Terabit Attacks and Botnet Smokescreens</title>
    <link href="https://www.systemshardening.com/articles/network/ddos-megascale-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/ddos-megascale-defence/</id>
    <published>2026-04-23T00:00:00.000Z</published>
    <updated>2026-04-23T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>DDoS Megascale Operations: Defending Against AI-Orchestrated Terabit Attacks and Botnet Smokescreens
Problem
DDoS attacks have crossed the terabit-per-second threshold and they are not slowing down....</summary>
  </entry>
  
  <entry>
    <title>Secret Management in CI/CD Pipelines: Vault, SOPS, and OIDC Federation</title>
    <link href="https://www.systemshardening.com/articles/cicd/cicd-secret-management/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/cicd-secret-management/</id>
    <published>2026-04-21T00:00:00.000Z</published>
    <updated>2026-04-21T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Secret Management in CI/CD Pipelines: Vault, SOPS, and OIDC Federation
Problem
Static credentials in CI/CD pipelines are the leading cause of secret sprawl. Teams store long-lived API keys, database...</summary>
  </entry>
  
  <entry>
    <title>IPv6 Security in Production: Hardening Dual-Stack Deployments</title>
    <link href="https://www.systemshardening.com/articles/network/ipv6-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/ipv6-security/</id>
    <published>2026-04-21T00:00:00.000Z</published>
    <updated>2026-04-21T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>IPv6 Security in Production: Hardening Dual-Stack Deployments
Problem
Most production environments run dual-stack (IPv4 and IPv6) whether the team intended it or not. Linux enables IPv6 by default....</summary>
  </entry>
  
  <entry>
    <title>Software Bill of Materials (SBOM) Generation and Consumption in CI/CD</title>
    <link href="https://www.systemshardening.com/articles/cicd/sbom/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/sbom/</id>
    <published>2026-04-19T00:00:00.000Z</published>
    <updated>2026-04-19T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Software Bill of Materials (SBOM) Generation and Consumption in CI/CD
Problem
SBOM generation is easy, run Syft, get a list of every package in your container image. SBOM consumption is hard: when a...</summary>
  </entry>
  
  <entry>
    <title>Training Data Extraction Prevention: Stopping Models from Leaking Memorised Data</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/training-data-extraction/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/training-data-extraction/</id>
    <published>2026-04-16T00:00:00.000Z</published>
    <updated>2026-04-16T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Training Data Extraction Prevention: Stopping Models from Leaking Memorised Data
Problem
Large language models memorise portions of their training data. Given the right prompt, a model will reproduce...</summary>
  </entry>
  
  <entry>
    <title>SSH Hardening Beyond the Basics: Certificate Authentication, Jump Hosts, and Logging</title>
    <link href="https://www.systemshardening.com/articles/linux/ssh-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/ssh-hardening/</id>
    <published>2026-04-16T00:00:00.000Z</published>
    <updated>2026-04-16T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>SSH Hardening Beyond the Basics: Certificate Authentication, Jump Hosts, and Logging
Problem
Every SSH hardening guide starts and ends with the same three changes: disable root login, require...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Node Hardening: From OS Configuration to kubelet Lockdown</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/node-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/node-hardening/</id>
    <published>2026-04-15T00:00:00.000Z</published>
    <updated>2026-04-15T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Node Hardening: From OS Configuration to kubelet Lockdown
Problem
A Kubernetes node is a Linux machine running kubelet, a container runtime, and your workloads. If the node is compromised,...</summary>
  </entry>
  
  <entry>
    <title>Securing the OpenTelemetry Collector: Deployment Patterns, TLS, and Access Control</title>
    <link href="https://www.systemshardening.com/articles/observability/otel-collector-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/otel-collector-hardening/</id>
    <published>2026-04-15T00:00:00.000Z</published>
    <updated>2026-04-15T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Securing the OpenTelemetry Collector: Deployment Patterns, TLS, and Access Control
Problem
The OpenTelemetry Collector sits at the center of every modern observability pipeline. Every trace, metric,...</summary>
  </entry>
  
  <entry>
    <title>Security Dashboards That Engineers Actually Use: Grafana Designs for Hardening Verification</title>
    <link href="https://www.systemshardening.com/articles/observability/security-dashboards/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/security-dashboards/</id>
    <published>2026-04-13T00:00:00.000Z</published>
    <updated>2026-04-13T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Security Dashboards That Engineers Actually Use: Grafana Designs for Hardening Verification
Problem
Most security dashboards are vanity metrics, total alerts this month, pie charts of vulnerability...</summary>
  </entry>
  
  <entry>
    <title>Model Extraction Prevention: Detecting and Blocking Model Stealing Through API Queries</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/model-extraction-prevention/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/model-extraction-prevention/</id>
    <published>2026-04-12T00:00:00.000Z</published>
    <updated>2026-04-12T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Model Extraction Prevention: Detecting and Blocking Model Stealing Through API Queries
Problem
Model extraction (model stealing) is an attack where an adversary queries a production ML API...</summary>
  </entry>
  
  <entry>
    <title>GPU Workload Isolation: MIG, MPS, and vGPU Security Boundaries</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/gpu-isolation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/gpu-isolation/</id>
    <published>2026-04-12T00:00:00.000Z</published>
    <updated>2026-04-12T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>GPU Workload Isolation: MIG, MPS, and vGPU Security Boundaries
Problem
Multi-tenant GPU sharing without isolation risks data leakage between workloads through shared GPU memory. NVIDIA offers three...</summary>
  </entry>
  
  <entry>
    <title>gRPC API Gateway Patterns: Authentication, Rate Limiting, and Request Validation at the Edge</title>
    <link href="https://www.systemshardening.com/articles/network/grpc-api-gateway-patterns/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/grpc-api-gateway-patterns/</id>
    <published>2026-04-12T00:00:00.000Z</published>
    <updated>2026-04-12T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>gRPC API Gateway Patterns: Authentication, Rate Limiting, and Request Validation at the Edge
Problem
Exposing gRPC services through an API gateway introduces security problems that do not exist with...</summary>
  </entry>
  
  <entry>
    <title>Securing AI Agents in Production: Tool-Use Boundaries, Credential Scoping, and Output Verification</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/securing-ai-agents/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/securing-ai-agents/</id>
    <published>2026-04-11T00:00:00.000Z</published>
    <updated>2026-04-11T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Securing AI Agents in Production: Tool-Use Boundaries, Credential Scoping, and Output Verification
Problem
AI agents are being deployed with production tool access: shell execution, kubectl, terraform...</summary>
  </entry>
  
  <entry>
    <title>Hardening DNS Resolution on Linux: systemd-resolved, Unbound, and DNS-over-TLS</title>
    <link href="https://www.systemshardening.com/articles/linux/dns-resolution-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/dns-resolution-hardening/</id>
    <published>2026-04-11T00:00:00.000Z</published>
    <updated>2026-04-11T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Hardening DNS Resolution on Linux: systemd-resolved, Unbound, and DNS-over-TLS
Problem
Most Linux hosts resolve DNS in plaintext over UDP port 53. On a stock Ubuntu 24.04 or RHEL 9 system:

Every DNS...</summary>
  </entry>
  
  <entry>
    <title>The Hardening Scorecard: Measuring and Tracking Security Posture</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/hardening-scorecard/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/hardening-scorecard/</id>
    <published>2026-04-10T00:00:00.000Z</published>
    <updated>2026-04-10T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>The Hardening Scorecard: Measuring and Tracking Security Posture
Problem
“Are we more secure than last month?” is a question most teams cannot answer. Security tools produce individual outputs:...</summary>
  </entry>
  
  <entry>
    <title>NGINX Hardening Beyond TLS: Request Filtering, Buffer Limits, and Connection Controls</title>
    <link href="https://www.systemshardening.com/articles/network/nginx-hardening-beyond-tls/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/nginx-hardening-beyond-tls/</id>
    <published>2026-04-10T00:00:00.000Z</published>
    <updated>2026-04-10T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>NGINX Hardening Beyond TLS: Request Filtering, Buffer Limits, and Connection Controls
Problem
Most NGINX hardening guides stop at TLS configuration, cipher suites, certificate setup, HSTS. In...</summary>
  </entry>
  
  <entry>
    <title>OpenTelemetry for Security: Distributed Tracing of Authentication and Authorization Flows</title>
    <link href="https://www.systemshardening.com/articles/observability/otel-security-tracing/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/otel-security-tracing/</id>
    <published>2026-04-09T00:00:00.000Z</published>
    <updated>2026-04-09T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>OpenTelemetry for Security: Distributed Tracing of Authentication and Authorization Flows
Problem
Distributed tracing is standard for performance debugging, but almost no team uses it for security....</summary>
  </entry>
  
  <entry>
    <title>Building an AI Governance Pipeline: Automated Checks from Training to Production</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-governance-pipeline/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-governance-pipeline/</id>
    <published>2026-04-08T00:00:00.000Z</published>
    <updated>2026-04-08T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Building an AI Governance Pipeline: Automated Checks from Training to Production
Problem
AI governance in most organisations is a manual process. A model is trained, someone writes a document, a...</summary>
  </entry>
  
  <entry>
    <title>Hardening the Linux Kernel Attack Surface with sysctl and Boot Parameters</title>
    <link href="https://www.systemshardening.com/articles/linux/sysctl-kernel-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/sysctl-kernel-hardening/</id>
    <published>2026-04-08T00:00:00.000Z</published>
    <updated>2026-04-08T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Hardening the Linux Kernel Attack Surface with sysctl and Boot Parameters
Problem
Linux kernels ship with defaults optimised for compatibility, not security. On a stock Ubuntu 24.04 or RHEL 9...</summary>
  </entry>
  
  <entry>
    <title>OpenTelemetry Collector Pipelines: Securing Receivers, Processors, and Exporters</title>
    <link href="https://www.systemshardening.com/articles/observability/otel-collector-pipelines/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/otel-collector-pipelines/</id>
    <published>2026-04-08T00:00:00.000Z</published>
    <updated>2026-04-08T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>OpenTelemetry Collector Pipelines: Securing Receivers, Processors, and Exporters
Problem
The OpenTelemetry Collector is a vendor-neutral proxy that receives, processes, and exports telemetry data. Out...</summary>
  </entry>
  
  <entry>
    <title>GPU Cost and Security Monitoring: Detecting Abuse and Optimising Spend</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/gpu-cost-security-monitoring/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/gpu-cost-security-monitoring/</id>
    <published>2026-04-06T00:00:00.000Z</published>
    <updated>2026-04-06T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>GPU Cost and Security Monitoring: Detecting Abuse and Optimising Spend
Problem
GPU compute costs between $2 and $30 per hour per device. A single unauthorised cryptocurrency mining pod running on an...</summary>
  </entry>
  
  <entry>
    <title>Rate Limiting at the Ingress Layer: NGINX, Envoy, and Cloud Load Balancers Compared</title>
    <link href="https://www.systemshardening.com/articles/network/rate-limiting-ingress/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/rate-limiting-ingress/</id>
    <published>2026-04-06T00:00:00.000Z</published>
    <updated>2026-04-06T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Rate Limiting at the Ingress Layer: NGINX, Envoy, and Cloud Load Balancers Compared
Problem
Rate limiting is the first line of defence against abuse, credential stuffing, API scraping, and...</summary>
  </entry>
  
  <entry>
    <title>Protecting Internal APIs: Network Segmentation, Authentication, and Access Logging</title>
    <link href="https://www.systemshardening.com/articles/network/internal-api-protection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/internal-api-protection/</id>
    <published>2026-04-05T00:00:00.000Z</published>
    <updated>2026-04-05T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Protecting Internal APIs: Network Segmentation, Authentication, and Access Logging
Problem
“It’s internal” is the most dangerous phrase in infrastructure security. Internal APIs sit behind the...</summary>
  </entry>
  
  <entry>
    <title>AI Supply Chain Attack Surface: Models, Datasets, and Inference Dependencies</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-supply-chain-attack-surface/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-supply-chain-attack-surface/</id>
    <published>2026-04-04T00:00:00.000Z</published>
    <updated>2026-04-04T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Supply Chain Attack Surface: Models, Datasets, and Inference Dependencies
Problem
AI systems introduce a supply chain attack surface that traditional software security does not cover. The three new...</summary>
  </entry>
  
  <entry>
    <title>EU AI Act Compliance for Infrastructure Teams: Risk Classification, Documentation, and Technical Controls</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/eu-ai-act-compliance/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/eu-ai-act-compliance/</id>
    <published>2026-04-03T00:00:00.000Z</published>
    <updated>2026-04-03T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>EU AI Act Compliance for Infrastructure Teams: Risk Classification, Documentation, and Technical Controls
Problem
The EU AI Act entered into force in August 2024, with enforcement timelines staggered...</summary>
  </entry>
  
  <entry>
    <title>LLM Rate Limiting in Production: Token Budgets, Per-User Quotas, and Abuse Detection</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/llm-rate-limiting/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/llm-rate-limiting/</id>
    <published>2026-04-03T00:00:00.000Z</published>
    <updated>2026-04-03T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>LLM Rate Limiting in Production: Token Budgets, Per-User Quotas, and Abuse Detection
Problem
Traditional API rate limiting counts requests. One request equals one unit. This assumption collapses with...</summary>
  </entry>
  
  <entry>
    <title>Terraform Security: State File Protection, Provider Pinning, and Plan Review Automation</title>
    <link href="https://www.systemshardening.com/articles/cicd/terraform-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/terraform-security/</id>
    <published>2026-04-02T00:00:00.000Z</published>
    <updated>2026-04-02T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Terraform Security: State File Protection, Provider Pinning, and Plan Review Automation
Problem
Terraform state files contain every secret, IP address, and configuration detail of your infrastructure...</summary>
  </entry>
  
  <entry>
    <title>Runtime Security with Falco on Kubernetes: Rules, Tuning, and Response Automation</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/falco-runtime-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/falco-runtime-security/</id>
    <published>2026-04-02T00:00:00.000Z</published>
    <updated>2026-04-02T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Runtime Security with Falco on Kubernetes: Rules, Tuning, and Response Automation
Problem
Prevention-only security has a binary failure mode: either the control holds and the attacker is stopped, or...</summary>
  </entry>
  
  <entry>
    <title>Load Balancer Security: Health Check Abuse, Connection Draining, and TLS Termination</title>
    <link href="https://www.systemshardening.com/articles/network/load-balancer-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/load-balancer-security/</id>
    <published>2026-04-02T00:00:00.000Z</published>
    <updated>2026-04-02T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Load Balancer Security: Health Check Abuse, Connection Draining, and TLS Termination
Problem
Load balancers sit at the most critical point in your infrastructure: every external request passes through...</summary>
  </entry>
  
  <entry>
    <title>MCP Tool Permission Patterns: Least Privilege, Approval Workflows, and Scope Boundaries</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/mcp-tool-permission-patterns/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/mcp-tool-permission-patterns/</id>
    <published>2026-04-01T00:00:00.000Z</published>
    <updated>2026-04-01T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>MCP Tool Permission Patterns: Least Privilege, Approval Workflows, and Scope Boundaries
Problem
An MCP server exposes a set of tools. A connected agent can invoke any of them. Out of the box, there is...</summary>
  </entry>
  
  <entry>
    <title>Claude for Application Security: Finding Logic Vulnerabilities in Source Code</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-code-vulnerability/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-code-vulnerability/</id>
    <published>2026-03-31T00:00:00.000Z</published>
    <updated>2026-03-31T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude for Application Security: Finding Logic Vulnerabilities in Source Code
Problem
Static application security testing (SAST) tools find pattern-based vulnerabilities effectively. Semgrep matches...</summary>
  </entry>
  
  <entry>
    <title>API Gateway Security: Authentication, Authorization, and Request Validation</title>
    <link href="https://www.systemshardening.com/articles/network/api-gateway-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/api-gateway-security/</id>
    <published>2026-03-30T00:00:00.000Z</published>
    <updated>2026-03-30T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>API Gateway Security: Authentication, Authorization, and Request Validation
Problem
Without a centralized API gateway, authentication and authorization logic is duplicated in every backend service....</summary>
  </entry>
  
  <entry>
    <title>Auditing AI Actions at Scale: Building Tamper-Proof Logs for Non-Human Actors</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/auditing-ai-actions/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/auditing-ai-actions/</id>
    <published>2026-03-29T00:00:00.000Z</published>
    <updated>2026-03-29T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Auditing AI Actions at Scale: Building Tamper-Proof Logs for Non-Human Actors
Problem
AI agents operate at machine speed, generating 10-100x the audit data of human operators. A single agent making 50...</summary>
  </entry>
  
  <entry>
    <title>Container Registry Security: Access Control, Vulnerability Scanning, and Garbage Collection</title>
    <link href="https://www.systemshardening.com/articles/cicd/container-registry-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/container-registry-security/</id>
    <published>2026-03-29T00:00:00.000Z</published>
    <updated>2026-03-29T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Container Registry Security: Access Control, Vulnerability Scanning, and Garbage Collection
Problem
Container registries store the most sensitive artifacts in your deployment pipeline. Every image...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Network Policies That Actually Work: From Default Deny to Microsegmentation</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/kubernetes-network-policies/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/kubernetes-network-policies/</id>
    <published>2026-03-29T00:00:00.000Z</published>
    <updated>2026-03-29T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Network Policies That Actually Work: From Default Deny to Microsegmentation
Problem
By default, every pod in a Kubernetes cluster can communicate with every other pod across all namespaces....</summary>
  </entry>
  
  <entry>
    <title>Compliance-as-Code: Mapping CIS Benchmarks to Automated Checks with InSpec and Kube-bench</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/compliance-as-code/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/compliance-as-code/</id>
    <published>2026-03-28T00:00:00.000Z</published>
    <updated>2026-03-28T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Compliance-as-Code: Mapping CIS Benchmarks to Automated Checks with InSpec and Kube-bench
Problem
Manual compliance audits are point-in-time snapshots that are outdated before the report is written....</summary>
  </entry>
  
  <entry>
    <title>LLM Cost Controls: Budget Enforcement, Token Metering, and Spend Alerting</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/llm-cost-controls/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/llm-cost-controls/</id>
    <published>2026-03-28T00:00:00.000Z</published>
    <updated>2026-03-28T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>LLM Cost Controls: Budget Enforcement, Token Metering, and Spend Alerting
Problem
LLM costs are unpredictable by default. A single API call to a frontier model can cost $0.001 or $2.00 depending on...</summary>
  </entry>
  
  <entry>
    <title>Pipeline-as-Code Security: Preventing CI Configuration Tampering</title>
    <link href="https://www.systemshardening.com/articles/cicd/pipeline-config-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/pipeline-config-security/</id>
    <published>2026-03-26T00:00:00.000Z</published>
    <updated>2026-03-26T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Pipeline-as-Code Security: Preventing CI Configuration Tampering
Problem
CI/CD pipeline definitions live alongside application code in Git. Whoever can modify .github/workflows/, .gitlab-ci.yml, or...</summary>
  </entry>
  
  <entry>
    <title>Kubelet Security Configuration: Authentication, Authorization, and Read-Only Port</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/kubelet-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/kubelet-security/</id>
    <published>2026-03-26T00:00:00.000Z</published>
    <updated>2026-03-26T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubelet Security Configuration: Authentication, Authorization, and Read-Only Port
Problem
The kubelet runs on every node in the cluster with root-level access to the container runtime, all pod...</summary>
  </entry>
  
  <entry>
    <title>Hardening GRUB and the Boot Process: Secure Boot, Boot Passwords, and Tamper Detection</title>
    <link href="https://www.systemshardening.com/articles/linux/grub-boot-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/grub-boot-hardening/</id>
    <published>2026-03-23T00:00:00.000Z</published>
    <updated>2026-03-23T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Hardening GRUB and the Boot Process: Secure Boot, Boot Passwords, and Tamper Detection
Problem
Without boot security, an attacker with physical access or console access (BMC, IPMI, cloud serial...</summary>
  </entry>
  
  <entry>
    <title>MCP Transport Security: Securing stdio, SSE, and HTTP Channels for Model Context Protocol</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/mcp-transport-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/mcp-transport-security/</id>
    <published>2026-03-22T00:00:00.000Z</published>
    <updated>2026-03-22T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>MCP Transport Security: Securing stdio, SSE, and HTTP Channels for Model Context Protocol
Problem
The Model Context Protocol defines how AI agents communicate with tool servers. The transport layer is...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes RBAC Design Patterns: Least Privilege Without Paralysing Developers</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/rbac-design-patterns/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/rbac-design-patterns/</id>
    <published>2026-03-22T00:00:00.000Z</published>
    <updated>2026-03-22T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes RBAC Design Patterns: Least Privilege Without Paralysing Developers
Problem
RBAC sprawl in multi-team Kubernetes clusters grows past 100 role bindings within months. The core tension is...</summary>
  </entry>
  
  <entry>
    <title>Claude for Kubernetes Security Auditing: Finding Privilege Escalation Paths Scanners Cannot See</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-kubernetes-audit/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-kubernetes-audit/</id>
    <published>2026-03-21T00:00:00.000Z</published>
    <updated>2026-03-21T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude for Kubernetes Security Auditing: Finding Privilege Escalation Paths Scanners Cannot See
Problem
Kubernetes security scanners evaluate resources individually. Tools like kube-bench check node...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Secrets Management: External Secrets Operator, Vault, and Sealed Secrets</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/secrets-management/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/secrets-management/</id>
    <published>2026-03-21T00:00:00.000Z</published>
    <updated>2026-03-21T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Secrets Management: External Secrets Operator, Vault, and Sealed Secrets
Problem
Kubernetes Secrets are base64-encoded, not encrypted. Running kubectl get secret my-secret -o...</summary>
  </entry>
  
  <entry>
    <title>LLM Jailbreak Defence: Detecting and Preventing System Prompt Bypasses in Production</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/llm-jailbreak-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/llm-jailbreak-defence/</id>
    <published>2026-03-20T00:00:00.000Z</published>
    <updated>2026-03-20T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>LLM Jailbreak Defence: Detecting and Preventing System Prompt Bypasses in Production
Problem
LLM jailbreaks are inputs that cause a model to ignore its system prompt, safety training, or usage...</summary>
  </entry>
  
  <entry>
    <title>AI Incident Forensics: Reconstructing What an AI System Did, Why, and What Data It Accessed</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-incident-forensics/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-incident-forensics/</id>
    <published>2026-03-19T00:00:00.000Z</published>
    <updated>2026-03-19T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>AI Incident Forensics: Reconstructing What an AI System Did, Why, and What Data It Accessed
Problem
When a traditional application causes an incident, you examine logs, traces, and database queries to...</summary>
  </entry>
  
  <entry>
    <title>TLS 1.3 Configuration for NGINX and Envoy: Ciphers, Certificates, and OCSP Stapling</title>
    <link href="https://www.systemshardening.com/articles/network/tls-nginx-envoy/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/tls-nginx-envoy/</id>
    <published>2026-03-19T00:00:00.000Z</published>
    <updated>2026-03-19T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>TLS 1.3 Configuration for NGINX and Envoy: Ciphers, Certificates, and OCSP Stapling
Problem
TLS misconfiguration remains one of the most common security findings in production infrastructure. Servers...</summary>
  </entry>
  
  <entry>
    <title>Verifying AI Agent Output: Deterministic Checks, Human-in-the-Loop Gates, and Rollback Safety</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-agent-output-verification/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-agent-output-verification/</id>
    <published>2026-03-18T00:00:00.000Z</published>
    <updated>2026-03-18T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Verifying AI Agent Output: Deterministic Checks, Human-in-the-Loop Gates, and Rollback Safety
Problem
AI agents generate infrastructure configurations, database migrations, deployment manifests, and...</summary>
  </entry>
  
  <entry>
    <title>Hardening Helm Values: Schema Validation, Secret Injection, and Security Defaults</title>
    <link href="https://www.systemshardening.com/articles/cicd/helm-values-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/helm-values-hardening/</id>
    <published>2026-03-18T00:00:00.000Z</published>
    <updated>2026-03-18T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Hardening Helm Values: Schema Validation, Secret Injection, and Security Defaults
Problem
Helm values files are the primary interface for configuring Kubernetes workloads, and they control...</summary>
  </entry>
  
  <entry>
    <title>Hardening Model Inference Endpoints: Authentication, Rate Limiting, and Input Validation</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/inference-endpoint-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/inference-endpoint-hardening/</id>
    <published>2026-03-18T00:00:00.000Z</published>
    <updated>2026-03-18T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Hardening Model Inference Endpoints: Authentication, Rate Limiting, and Input Validation
Problem
Model inference endpoints are GPU-backed and expensive, $2-30 per hour per GPU. A single unprotected...</summary>
  </entry>
  
  <entry>
    <title>mTLS for Service-to-Service Communication: Istio, Linkerd, and DIY with cert-manager</title>
    <link href="https://www.systemshardening.com/articles/network/mtls-service-mesh/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/mtls-service-mesh/</id>
    <published>2026-03-18T00:00:00.000Z</published>
    <updated>2026-03-18T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>mTLS for Service-to-Service Communication: Istio, Linkerd, and DIY with cert-manager
Problem
Internal service-to-service traffic in most Kubernetes clusters is plaintext. Once an attacker compromises...</summary>
  </entry>
  
  <entry>
    <title>Securing MCP Servers: Authentication, Tool Sandboxing, and Input Validation for Model Context Protocol</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/mcp-server-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/mcp-server-security/</id>
    <published>2026-03-17T00:00:00.000Z</published>
    <updated>2026-03-17T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Securing MCP Servers: Authentication, Tool Sandboxing, and Input Validation for Model Context Protocol
Problem
The Model Context Protocol (MCP) gives AI agents structured access to tools: filesystem...</summary>
  </entry>
  
  <entry>
    <title>Securing CI/CD Runners: Isolation, Credential Scoping, and Ephemeral Environments</title>
    <link href="https://www.systemshardening.com/articles/cicd/securing-cicd-runners/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/securing-cicd-runners/</id>
    <published>2026-03-14T00:00:00.000Z</published>
    <updated>2026-03-14T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Securing CI/CD Runners: Isolation, Credential Scoping, and Ephemeral Environments
Problem
CI/CD runners are the most privileged, least monitored components in most infrastructure. A self-hosted runner...</summary>
  </entry>
  
  <entry>
    <title>Hardening PostgreSQL for Production: Authentication, Encryption, Row-Level Security, and Audit Logging</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/postgresql-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/postgresql-hardening/</id>
    <published>2026-03-13T00:00:00.000Z</published>
    <updated>2026-03-13T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Hardening PostgreSQL for Production: Authentication, Encryption, Row-Level Security, and Audit Logging
Problem
PostgreSQL defaults prioritise developer convenience over security. A stock installation...</summary>
  </entry>
  
  <entry>
    <title>Lateral Movement Detection: Network Patterns, Authentication Anomalies, and Alert Correlation</title>
    <link href="https://www.systemshardening.com/articles/observability/lateral-movement-detection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/lateral-movement-detection/</id>
    <published>2026-03-13T00:00:00.000Z</published>
    <updated>2026-03-13T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Lateral Movement Detection: Network Patterns, Authentication Anomalies, and Alert Correlation
Problem
East-west traffic inside a Kubernetes cluster is a blind spot for most security teams. Once an...</summary>
  </entry>
  
  <entry>
    <title>Hardening /proc and /sys: Restricting Kernel Information Disclosure</title>
    <link href="https://www.systemshardening.com/articles/linux/proc-sys-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/proc-sys-hardening/</id>
    <published>2026-03-11T00:00:00.000Z</published>
    <updated>2026-03-11T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Hardening /proc and /sys: Restricting Kernel Information Disclosure
Problem
/proc and /sys are virtual filesystems that expose kernel internals, hardware details, and process information to userspace....</summary>
  </entry>
  
  <entry>
    <title>Claude for Infrastructure-as-Code Security Review: Terraform, CloudFormation, and Pulumi</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-iac-review/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-iac-review/</id>
    <published>2026-03-10T00:00:00.000Z</published>
    <updated>2026-03-10T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude for Infrastructure-as-Code Security Review: Terraform, CloudFormation, and Pulumi
Problem
Infrastructure-as-Code scanners like Checkov, tflint, and cfn-lint enforce policy through pattern...</summary>
  </entry>
  
  <entry>
    <title>LLM Prompt Security Patterns: System Prompt Protection, Input Sanitisation, and Context Isolation</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/llm-prompt-security-patterns/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/llm-prompt-security-patterns/</id>
    <published>2026-03-10T00:00:00.000Z</published>
    <updated>2026-03-10T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>LLM Prompt Security Patterns: System Prompt Protection, Input Sanitisation, and Context Isolation
Problem
Every LLM application has a system prompt. It defines the model’s role, its constraints, what...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Admission Control: From PodSecurity Standards to Custom OPA/Kyverno Policies</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/kubernetes-admission-control/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/kubernetes-admission-control/</id>
    <published>2026-03-10T00:00:00.000Z</published>
    <updated>2026-03-10T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Admission Control: From PodSecurity Standards to Custom OPA/Kyverno Policies
Problem
Without admission control, any user with deployment permissions can run privileged containers, mount the...</summary>
  </entry>
  
  <entry>
    <title>Algorithmic Auditing: Testing AI Systems for Bias, Fairness, and Safety Before Deployment</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/algorithmic-auditing/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/algorithmic-auditing/</id>
    <published>2026-03-09T00:00:00.000Z</published>
    <updated>2026-03-09T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Algorithmic Auditing: Testing AI Systems for Bias, Fairness, and Safety Before Deployment
Problem
AI systems make decisions that affect people: who gets approved for a loan, whose resume gets...</summary>
  </entry>
  
  <entry>
    <title>Hardening a Complete Kubernetes Platform: From Cluster Bootstrap to Production-Ready</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/complete-kubernetes-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/complete-kubernetes-hardening/</id>
    <published>2026-03-09T00:00:00.000Z</published>
    <updated>2026-03-09T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Hardening a Complete Kubernetes Platform: From Cluster Bootstrap to Production-Ready
Problem
A fresh Kubernetes cluster (whether bootstrapped with kubeadm, k3s, or provisioned by a managed provider)...</summary>
  </entry>
  
  <entry>
    <title>AI Data Leakage Prevention: Input Filtering, Output Scanning, and Audit Trails</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-data-leakage-prevention/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-data-leakage-prevention/</id>
    <published>2026-03-08T00:00:00.000Z</published>
    <updated>2026-03-08T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>AI Data Leakage Prevention: Input Filtering, Output Scanning, and Audit Trails
Problem
AI systems leak data in ways traditional applications do not. A language model trained on customer data can...</summary>
  </entry>
  
  <entry>
    <title>Linux Audit Framework Deep Dive: auditd Rules, auditctl, and ausearch for Security Monitoring</title>
    <link href="https://www.systemshardening.com/articles/linux/auditd-deep-dive/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/auditd-deep-dive/</id>
    <published>2026-03-08T00:00:00.000Z</published>
    <updated>2026-03-08T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Linux Audit Framework Deep Dive: auditd Rules, auditctl, and ausearch for Security Monitoring
Problem
auditd is the kernel-level audit system on Linux, it captures syscalls, file access, user...</summary>
  </entry>
  
  <entry>
    <title>Jupyter Notebook Security: Authentication, Isolation, and Data Protection</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/jupyter-notebook-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/jupyter-notebook-security/</id>
    <published>2026-03-06T00:00:00.000Z</published>
    <updated>2026-03-06T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Jupyter Notebook Security: Authentication, Isolation, and Data Protection
Problem
JupyterHub is a code execution platform. Every notebook cell is arbitrary code running with whatever permissions the...</summary>
  </entry>
  
  <entry>
    <title>gRPC Load Balancing Security: Client-Side, Proxy, and Service Mesh Patterns</title>
    <link href="https://www.systemshardening.com/articles/network/grpc-load-balancing-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/grpc-load-balancing-security/</id>
    <published>2026-03-05T00:00:00.000Z</published>
    <updated>2026-03-05T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>gRPC Load Balancing Security: Client-Side, Proxy, and Service Mesh Patterns
Problem
gRPC uses HTTP/2, which multiplexes many requests over a single TCP connection. This creates a fundamental conflict...</summary>
  </entry>
  
  <entry>
    <title>Security-Relevant Prometheus Metrics: What to Collect, How to Alert, When to Page</title>
    <link href="https://www.systemshardening.com/articles/observability/prometheus-security-metrics/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/prometheus-security-metrics/</id>
    <published>2026-03-05T00:00:00.000Z</published>
    <updated>2026-03-05T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Security-Relevant Prometheus Metrics: What to Collect, How to Alert, When to Page
Problem
Prometheus is deployed in most Kubernetes environments for infrastructure monitoring (CPU, memory, disk,...</summary>
  </entry>
  
  <entry>
    <title>Claude, Mythos, and the Non-Human Infrastructure Consumer: Writing Hardening Guides for AI Agents</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-non-human-consumers/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-non-human-consumers/</id>
    <published>2026-03-04T00:00:00.000Z</published>
    <updated>2026-03-04T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude, Mythos, and the Non-Human Infrastructure Consumer: Writing Hardening Guides for AI Agents
Problem
AI models are no longer just tools that engineers use to write code. They are becoming direct...</summary>
  </entry>
  
  <entry>
    <title>Incident Response Hardening Playbook: From Detection to Post-Mortem</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/incident-response-hardening-playbook/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/incident-response-hardening-playbook/</id>
    <published>2026-03-02T00:00:00.000Z</published>
    <updated>2026-03-02T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Incident Response Hardening Playbook: From Detection to Post-Mortem
Problem
During an active security incident, hardening is reactive: isolate the compromised system, contain the blast radius,...</summary>
  </entry>
  
  <entry>
    <title>Multi-Tenancy Hardening in Kubernetes: Namespace Isolation, Resource Quotas, and Network Boundaries</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/multi-tenancy-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/multi-tenancy-hardening/</id>
    <published>2026-03-02T00:00:00.000Z</published>
    <updated>2026-03-02T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Multi-Tenancy Hardening in Kubernetes: Namespace Isolation, Resource Quotas, and Network Boundaries
Problem
Kubernetes namespaces provide logical separation, not security isolation. By default, pods...</summary>
  </entry>
  
  <entry>
    <title>DNS Security for Production Infrastructure: DNSSEC, CAA Records, and Internal Resolution</title>
    <link href="https://www.systemshardening.com/articles/network/dns-security-dnssec-caa/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/dns-security-dnssec-caa/</id>
    <published>2026-03-02T00:00:00.000Z</published>
    <updated>2026-03-02T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>DNS Security for Production Infrastructure: DNSSEC, CAA Records, and Internal Resolution
Problem
DNS is the most critical single point of failure in any infrastructure, and the least hardened layer...</summary>
  </entry>
  
  <entry>
    <title>Securing Helm Charts: Chart Signing, Value Injection, and Template Security</title>
    <link href="https://www.systemshardening.com/articles/cicd/helm-chart-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/helm-chart-security/</id>
    <published>2026-03-01T00:00:00.000Z</published>
    <updated>2026-03-01T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Securing Helm Charts: Chart Signing, Value Injection, and Template Security
Problem
Helm is the dominant package manager for Kubernetes, but most teams install charts without verifying provenance,...</summary>
  </entry>
  
  <entry>
    <title>Building a Content Filtering Pipeline for LLM Applications: From Raw Input to Safe Output</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-content-filtering-pipeline/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-content-filtering-pipeline/</id>
    <published>2026-03-01T00:00:00.000Z</published>
    <updated>2026-03-01T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Building a Content Filtering Pipeline for LLM Applications: From Raw Input to Safe Output
Problem
A single content filter is not a pipeline. Most LLM deployments add one filter (usually on output) and...</summary>
  </entry>
  
  <entry>
    <title>AI Red Teaming Methodology: Structured Adversarial Testing for LLM Applications</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-red-teaming/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-red-teaming/</id>
    <published>2026-03-01T00:00:00.000Z</published>
    <updated>2026-03-01T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>AI Red Teaming Methodology: Structured Adversarial Testing for LLM Applications
Problem
Traditional security testing (penetration testing, vulnerability scanning) does not cover AI-specific attack...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Image Policy Enforcement: Cosign, Notation, and Admission Webhooks</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/image-policy-enforcement/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/image-policy-enforcement/</id>
    <published>2026-02-26T00:00:00.000Z</published>
    <updated>2026-02-26T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Image Policy Enforcement: Cosign, Notation, and Admission Webhooks
Problem
Without image policy enforcement, any container image from any registry can run in a Kubernetes cluster. A...</summary>
  </entry>
  
  <entry>
    <title>Linux Firewall Hardening with nftables: Replacing iptables in Production</title>
    <link href="https://www.systemshardening.com/articles/linux/nftables/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/nftables/</id>
    <published>2026-02-26T00:00:00.000Z</published>
    <updated>2026-02-26T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Linux Firewall Hardening with nftables: Replacing iptables in Production
Problem
iptables is deprecated. nftables is the replacement in every modern Linux kernel (5.0+). Most teams either still use...</summary>
  </entry>
  
  <entry>
    <title>Helm Supply Chain Security: OCI Registries, Provenance Verification, and Chart Mirroring</title>
    <link href="https://www.systemshardening.com/articles/cicd/helm-supply-chain-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/helm-supply-chain-security/</id>
    <published>2026-02-25T00:00:00.000Z</published>
    <updated>2026-02-25T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Helm Supply Chain Security: OCI Registries, Provenance Verification, and Chart Mirroring
Problem
Helm charts are executable Kubernetes manifests packaged as tarballs. Most teams install them without...</summary>
  </entry>
  
  <entry>
    <title>Security Infrastructure Disaster Recovery: Vault, PKI, and SIEM Failover</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/security-infra-disaster-recovery/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/security-infra-disaster-recovery/</id>
    <published>2026-02-24T00:00:00.000Z</published>
    <updated>2026-02-24T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Security Infrastructure Disaster Recovery: Vault, PKI, and SIEM Failover
Problem
When your security infrastructure fails, you are flying blind. If Vault is down, applications cannot retrieve secrets...</summary>
  </entry>
  
  <entry>
    <title>Securing RAG Pipelines: Vector Database Access Control, Document Poisoning, and Retrieval Filtering</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/rag-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/rag-security/</id>
    <published>2026-02-24T00:00:00.000Z</published>
    <updated>2026-02-24T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Securing RAG Pipelines: Vector Database Access Control, Document Poisoning, and Retrieval Filtering
Problem
Retrieval-Augmented Generation (RAG) adds a knowledge base to LLM applications, the model...</summary>
  </entry>
  
  <entry>
    <title>Detecting AI-Generated Attacks: Moving from Signatures to Behavioural Baselines</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/detecting-ai-attacks/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/detecting-ai-attacks/</id>
    <published>2026-02-23T00:00:00.000Z</published>
    <updated>2026-02-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Detecting AI-Generated Attacks: Moving from Signatures to Behavioural Baselines
Problem
Signature-based detection (WAF CRS rules, static Falco rules, antivirus signatures) matches “known bad.”...</summary>
  </entry>
  
  <entry>
    <title>Pod Security Context Deep Dive: runAsNonRoot, readOnlyRootFilesystem, and Capabilities</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/pod-security-context/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/pod-security-context/</id>
    <published>2026-02-23T00:00:00.000Z</published>
    <updated>2026-02-23T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Pod Security Context Deep Dive: runAsNonRoot, readOnlyRootFilesystem, and Capabilities
Problem
Kubernetes SecurityContext has over 15 configurable fields, but most teams only set runAsNonRoot: true...</summary>
  </entry>
  
  <entry>
    <title>WAF Rule Tuning That Does Not Break Legitimate Traffic: ModSecurity and Coraza in Practice</title>
    <link href="https://www.systemshardening.com/articles/network/waf-rule-tuning/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/waf-rule-tuning/</id>
    <published>2026-02-22T00:00:00.000Z</published>
    <updated>2026-02-22T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>WAF Rule Tuning That Does Not Break Legitimate Traffic: ModSecurity and Coraza in Practice
Problem
A self-managed Web Application Firewall (WAF) with default rules generates dozens of false positives...</summary>
  </entry>
  
  <entry>
    <title>eBPF-Based Security Monitoring: Tetragon for Process, Network, and File Observability</title>
    <link href="https://www.systemshardening.com/articles/observability/ebpf-tetragon/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/ebpf-tetragon/</id>
    <published>2026-02-22T00:00:00.000Z</published>
    <updated>2026-02-22T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>eBPF-Based Security Monitoring: Tetragon for Process, Network, and File Observability
Problem
Falco monitors syscalls for runtime detection. Tetragon (CNCF/Cilium) goes deeper: it monitors process...</summary>
  </entry>
  
  <entry>
    <title>Adversarial Attacks on Embeddings: Poisoning Vector Stores and Manipulating Semantic Search</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/adversarial-embedding-attacks/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/adversarial-embedding-attacks/</id>
    <published>2026-02-21T00:00:00.000Z</published>
    <updated>2026-02-21T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Adversarial Attacks on Embeddings: Poisoning Vector Stores and Manipulating Semantic Search
Problem
Embedding-based retrieval powers RAG pipelines, semantic search, recommendation systems, and...</summary>
  </entry>
  
  <entry>
    <title>Migrating from Self-Hosted Prometheus to Grafana Cloud: Preserving Dashboards, Alerts, and History</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/migrate-prometheus-grafana-cloud/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/migrate-prometheus-grafana-cloud/</id>
    <published>2026-02-21T00:00:00.000Z</published>
    <updated>2026-02-21T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Migrating from Self-Hosted Prometheus to Grafana Cloud: Preserving Dashboards, Alerts, and History
Problem
Self-hosted Prometheus consumes 500GB+ storage within 6 months for a 20-node Kubernetes...</summary>
  </entry>
  
  <entry>
    <title>Cgroup v2 Resource Isolation: Preventing Resource Exhaustion Attacks on Shared Systems</title>
    <link href="https://www.systemshardening.com/articles/linux/cgroup-resource-isolation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/cgroup-resource-isolation/</id>
    <published>2026-02-21T00:00:00.000Z</published>
    <updated>2026-02-21T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Cgroup v2 Resource Isolation: Preventing Resource Exhaustion Attacks on Shared Systems
Problem
Without resource limits, a single service, container, or compromised process can consume all available...</summary>
  </entry>
  
  <entry>
    <title>SELinux in Production: Writing Custom Policies Without Losing Your Mind</title>
    <link href="https://www.systemshardening.com/articles/linux/selinux/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/selinux/</id>
    <published>2026-02-21T00:00:00.000Z</published>
    <updated>2026-02-21T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>SELinux in Production: Writing Custom Policies Without Losing Your Mind
Problem
SELinux is the most powerful mandatory access control system on Linux, and the most disabled. The majority of...</summary>
  </entry>
  
  <entry>
    <title>AI-Powered Vulnerability Discovery: What Automated Code Analysis Means for Your Patch Cycle</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-vulnerability-discovery/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-vulnerability-discovery/</id>
    <published>2026-02-19T00:00:00.000Z</published>
    <updated>2026-02-19T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI-Powered Vulnerability Discovery: What Automated Code Analysis Means for Your Patch Cycle
Problem
AI models can now discover exploitable vulnerabilities in source code faster than human researchers....</summary>
  </entry>
  
  <entry>
    <title>Artifact Integrity Verification: Checksums, Signatures, and Transparency Logs</title>
    <link href="https://www.systemshardening.com/articles/cicd/artifact-integrity/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/artifact-integrity/</id>
    <published>2026-02-19T00:00:00.000Z</published>
    <updated>2026-02-19T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Artifact Integrity Verification: Checksums, Signatures, and Transparency Logs
Problem
Build artifacts pass through multiple stages between source code and production deployment. Source is compiled in...</summary>
  </entry>
  
  <entry>
    <title>Agent-to-Agent Trust: Authentication, Delegation, and Capability Boundaries in Multi-Agent Systems</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/agent-to-agent-trust/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/agent-to-agent-trust/</id>
    <published>2026-02-18T00:00:00.000Z</published>
    <updated>2026-02-18T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Agent-to-Agent Trust: Authentication, Delegation, and Capability Boundaries in Multi-Agent Systems
Problem
Multi-agent systems are moving from research demos to production deployments. A coordinator...</summary>
  </entry>
  
  <entry>
    <title>Securing LLM Deployments: Model Loading, Runtime Isolation, and Inference Infrastructure</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/llm-deployment-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/llm-deployment-security/</id>
    <published>2026-02-18T00:00:00.000Z</published>
    <updated>2026-02-18T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Securing LLM Deployments: Model Loading, Runtime Isolation, and Inference Infrastructure
Problem
Deploying a language model into production is not just a machine learning problem. It is an...</summary>
  </entry>
  
  <entry>
    <title>Vector Database Security: Access Control, Embedding Protection, and Query Isolation</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/vector-database-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/vector-database-security/</id>
    <published>2026-02-18T00:00:00.000Z</published>
    <updated>2026-02-18T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Vector Database Security: Access Control, Embedding Protection, and Query Isolation
Problem
Vector databases are the backbone of RAG (Retrieval-Augmented Generation) systems. They store document...</summary>
  </entry>
  
  <entry>
    <title>The Threat Model Has Changed: Rewriting Security Assumptions for an AI-Augmented World</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/threat-model-ai-augmented/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/threat-model-ai-augmented/</id>
    <published>2026-02-17T00:00:00.000Z</published>
    <updated>2026-02-17T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>The Threat Model Has Changed: Rewriting Security Assumptions for an AI-Augmented World
Problem
Every security architecture is built on assumptions about what attackers can do, how fast they can do it,...</summary>
  </entry>
  
  <entry>
    <title>A/B Model Deployment Safety: Canary Rollouts, Traffic Splitting, and Automated Rollback for ML Models</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ab-deployment-safety/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ab-deployment-safety/</id>
    <published>2026-02-16T00:00:00.000Z</published>
    <updated>2026-02-16T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>A/B Model Deployment Safety: Canary Rollouts, Traffic Splitting, and Automated Rollback for ML Models
Problem
Deploying a new ML model version is not the same as deploying a new application version. A...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes API Server Hardening: Flags, Authentication, and Audit Logging</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/api-server-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/api-server-hardening/</id>
    <published>2026-02-15T00:00:00.000Z</published>
    <updated>2026-02-15T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes API Server Hardening: Flags, Authentication, and Audit Logging
Problem
The API server is the front door to the Kubernetes cluster. Every kubectl command, every controller reconciliation,...</summary>
  </entry>
  
  <entry>
    <title>Time Synchronization Security: Hardening NTP and Chrony Against Manipulation</title>
    <link href="https://www.systemshardening.com/articles/linux/time-sync-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/time-sync-security/</id>
    <published>2026-02-15T00:00:00.000Z</published>
    <updated>2026-02-15T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Time Synchronization Security: Hardening NTP and Chrony Against Manipulation
Problem
Accurate time is a silent dependency of almost every security control on a Linux system. When an attacker can...</summary>
  </entry>
  
  <entry>
    <title>Securing GitHub Actions: Permissions, Pinning, and Workflow Injection Prevention</title>
    <link href="https://www.systemshardening.com/articles/cicd/securing-github-actions/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/securing-github-actions/</id>
    <published>2026-02-13T00:00:00.000Z</published>
    <updated>2026-02-13T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Securing GitHub Actions: Permissions, Pinning, and Workflow Injection Prevention
Problem
GitHub Actions is the most widely used CI/CD platform, but its security model is scattered across dozens of...</summary>
  </entry>
  
  <entry>
    <title>Automated OS Hardening with Ansible: A Production-Ready Playbook Collection</title>
    <link href="https://www.systemshardening.com/articles/linux/ansible-os-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/ansible-os-hardening/</id>
    <published>2026-02-12T00:00:00.000Z</published>
    <updated>2026-02-12T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Automated OS Hardening with Ansible: A Production-Ready Playbook Collection
Problem
Manual OS hardening does not scale. The sysctl settings from Hardening the Linux Kernel Attack Surface with sysctl...</summary>
  </entry>
  
  <entry>
    <title>Securing Message Queues in Production: Kafka, RabbitMQ, and NATS Hardening</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/message-queue-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/message-queue-hardening/</id>
    <published>2026-02-10T00:00:00.000Z</published>
    <updated>2026-02-10T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Securing Message Queues in Production: Kafka, RabbitMQ, and NATS Hardening
Problem
Message brokers carry some of the most sensitive data in any architecture, payment events, user actions, system...</summary>
  </entry>
  
  <entry>
    <title>Log Integrity and Tamper Detection: Ensuring Your Audit Trail Is Trustworthy</title>
    <link href="https://www.systemshardening.com/articles/observability/log-integrity/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/log-integrity/</id>
    <published>2026-02-10T00:00:00.000Z</published>
    <updated>2026-02-10T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Log Integrity and Tamper Detection: Ensuring Your Audit Trail Is Trustworthy
Problem
An attacker’s first post-compromise action is covering their tracks. On a Linux host, this means deleting...</summary>
  </entry>
  
  <entry>
    <title>Seccomp Profiles for Production Workloads: Writing, Testing, and Deploying Custom Profiles</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/seccomp-profiles/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/seccomp-profiles/</id>
    <published>2026-02-09T00:00:00.000Z</published>
    <updated>2026-02-09T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Seccomp Profiles for Production Workloads: Writing, Testing, and Deploying Custom Profiles
Problem
The default container runtime allows approximately 300 syscalls. A compromised container can use...</summary>
  </entry>
  
  <entry>
    <title>Container Escape Detection: Runtime Signals, Kernel Indicators, and Response Automation</title>
    <link href="https://www.systemshardening.com/articles/observability/container-escape-detection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/container-escape-detection/</id>
    <published>2026-02-07T00:00:00.000Z</published>
    <updated>2026-02-07T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Container Escape Detection: Runtime Signals, Kernel Indicators, and Response Automation
Problem
Container escapes are the highest-impact attack in Kubernetes. A single compromised pod that escapes its...</summary>
  </entry>
  
  <entry>
    <title>Multi-Cloud Hardening: Consistent Security Posture Across Providers</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/multi-cloud-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/multi-cloud-hardening/</id>
    <published>2026-02-04T00:00:00.000Z</published>
    <updated>2026-02-04T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Multi-Cloud Hardening: Consistent Security Posture Across Providers
Problem
Running infrastructure across multiple cloud providers means maintaining consistent security controls across fundamentally...</summary>
  </entry>
  
  <entry>
    <title>AI Model Cards in Production: Documenting Capabilities, Limitations, and Security Properties</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-model-cards/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-model-cards/</id>
    <published>2026-02-02T00:00:00.000Z</published>
    <updated>2026-02-02T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Model Cards in Production: Documenting Capabilities, Limitations, and Security Properties
Problem
Every production AI model has boundaries: input domains where it performs well, edge cases where it...</summary>
  </entry>
  
  <entry>
    <title>PAM Configuration Hardening: Password Policies, Login Controls, and MFA Integration</title>
    <link href="https://www.systemshardening.com/articles/linux/pam-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/pam-hardening/</id>
    <published>2026-02-02T00:00:00.000Z</published>
    <updated>2026-02-02T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>PAM Configuration Hardening: Password Policies, Login Controls, and MFA Integration
Problem
PAM (Pluggable Authentication Modules) is the authentication foundation on Linux. Default PAM stacks allow...</summary>
  </entry>
  
  <entry>
    <title>Hardening the AI Control Plane: Kill Switches, Rate Limits, and Human-in-the-Loop Gates</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-control-plane/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-control-plane/</id>
    <published>2026-02-01T00:00:00.000Z</published>
    <updated>2026-02-01T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Hardening the AI Control Plane: Kill Switches, Rate Limits, and Human-in-the-Loop Gates
Problem
AI agents with write access to production systems can execute 100+ infrastructure changes per minute. A...</summary>
  </entry>
  
  <entry>
    <title>How AI Is Compressing the Attacker Timeline: What Defenders Need to Change Now</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-compressing-attacker-timeline/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-compressing-attacker-timeline/</id>
    <published>2026-01-30T00:00:00.000Z</published>
    <updated>2026-01-30T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>How AI Is Compressing the Attacker Timeline: What Defenders Need to Change Now
Problem
The gap between vulnerability disclosure and weaponised exploit used to be measured in weeks. In 2020, the median...</summary>
  </entry>
  
  <entry>
    <title>Membership Inference Defence: Preventing Attackers from Determining Training Data Inclusion</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/membership-inference-defence/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/membership-inference-defence/</id>
    <published>2026-01-28T00:00:00.000Z</published>
    <updated>2026-01-28T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Membership Inference Defence: Preventing Attackers from Determining Training Data Inclusion
Problem
Membership inference attacks determine whether a specific data record was used to train a model. An...</summary>
  </entry>
  
  <entry>
    <title>Dependency Pinning and Lockfile Integrity: Preventing Supply Chain Attacks in CI</title>
    <link href="https://www.systemshardening.com/articles/cicd/dependency-pinning/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/dependency-pinning/</id>
    <published>2026-01-28T00:00:00.000Z</published>
    <updated>2026-01-28T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Dependency Pinning and Lockfile Integrity: Preventing Supply Chain Attacks in CI
Problem
Dependency confusion and typosquatting attacks exploit the gap between “I declared a dependency” and “I...</summary>
  </entry>
  
  <entry>
    <title>etcd Encryption at Rest: Configuration, Key Rotation, and Performance Impact</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/etcd-encryption/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/etcd-encryption/</id>
    <published>2026-01-28T00:00:00.000Z</published>
    <updated>2026-01-28T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>etcd Encryption at Rest: Configuration, Key Rotation, and Performance Impact
Problem
Kubernetes Secrets are stored in etcd as base64-encoded plaintext. Base64 is an encoding, not encryption. Anyone...</summary>
  </entry>
  
  <entry>
    <title>Kernel Module Hardening: Blacklisting, Signing, and Preventing Runtime Loading</title>
    <link href="https://www.systemshardening.com/articles/linux/kernel-module-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/kernel-module-hardening/</id>
    <published>2026-01-28T00:00:00.000Z</published>
    <updated>2026-01-28T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Kernel Module Hardening: Blacklisting, Signing, and Preventing Runtime Loading
Problem
The Linux kernel loads modules on demand. When a process requests a capability that is not built into the running...</summary>
  </entry>
  
  <entry>
    <title>Zero Trust Networking: Identity-Based Access Beyond Perimeter Security</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/zero-trust-networking/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/zero-trust-networking/</id>
    <published>2026-01-27T00:00:00.000Z</published>
    <updated>2026-01-27T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Zero Trust Networking: Identity-Based Access Beyond Perimeter Security
Problem
Perimeter security assumes the internal network is safe. It is not. A single compromised pod, a stolen VPN credential, or...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Audit Log Pipeline Design: From API Server to SIEM</title>
    <link href="https://www.systemshardening.com/articles/observability/k8s-audit-log-design/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/k8s-audit-log-design/</id>
    <published>2026-01-27T00:00:00.000Z</published>
    <updated>2026-01-27T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Kubernetes Audit Log Pipeline Design: From API Server to SIEM
Problem
Kubernetes audit logging at the RequestResponse level captures everything: every API call, every request body, every response...</summary>
  </entry>
  
  <entry>
    <title>Sandboxing AI Agent Tool Use: Filesystem, Network, and Process Isolation for Autonomous Actions</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/agent-tool-use-sandboxing/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/agent-tool-use-sandboxing/</id>
    <published>2026-01-26T00:00:00.000Z</published>
    <updated>2026-01-26T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Sandboxing AI Agent Tool Use: Filesystem, Network, and Process Isolation for Autonomous Actions
Problem
AI agents execute tool calls on real infrastructure: writing files, running shell commands,...</summary>
  </entry>
  
  <entry>
    <title>Claude for Security Detection: How Large Language Models Find What Scanners Miss</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-security-detection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-security-detection/</id>
    <published>2026-01-26T00:00:00.000Z</published>
    <updated>2026-01-26T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude for Security Detection: How Large Language Models Find What Scanners Miss
Problem
Traditional security scanners operate on pattern matching. They check for known CVEs in dependency trees, match...</summary>
  </entry>
  
  <entry>
    <title>Implementing AI Guardrails: Input Validation, Output Filtering, and Safety Classifiers in Production</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-guardrails-implementation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-guardrails-implementation/</id>
    <published>2026-01-26T00:00:00.000Z</published>
    <updated>2026-01-26T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Implementing AI Guardrails: Input Validation, Output Filtering, and Safety Classifiers in Production
Problem
Deploying an LLM without guardrails is deploying an application where any user can make it...</summary>
  </entry>
  
  <entry>
    <title>Hardening Container Base Images: From ubuntu:latest to a Minimal, Signed, Scannable Image</title>
    <link href="https://www.systemshardening.com/articles/linux/container-base-images/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/container-base-images/</id>
    <published>2026-01-26T00:00:00.000Z</published>
    <updated>2026-01-26T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Hardening Container Base Images: From ubuntu:latest to a Minimal, Signed, Scannable Image
Problem
ubuntu:latest ships with over 200 packages. At any given point, a vulnerability scan with Trivy will...</summary>
  </entry>
  
  <entry>
    <title>Using AI to Harden Systems: Automated Configuration Review and Remediation</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-assisted-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-assisted-hardening/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Using AI to Harden Systems: Automated Configuration Review and Remediation
Problem
Manual security review of infrastructure-as-code takes 2-4 hours per pull request for complex changes. A team...</summary>
  </entry>
  
  <entry>
    <title>Reproducible Builds for Container Images: Achieving Deterministic Output</title>
    <link href="https://www.systemshardening.com/articles/cicd/reproducible-builds/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/reproducible-builds/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>Reproducible Builds for Container Images: Achieving Deterministic Output
Problem
Two builds from the same source code should produce the same container image. In practice, they almost never do....</summary>
  </entry>
  
  <entry>
    <title>Hardening Kubernetes Ingress Controllers: NGINX, Traefik, and Envoy Compared</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ingress-controller-comparison/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ingress-controller-comparison/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Hardening Kubernetes Ingress Controllers: NGINX, Traefik, and Envoy Compared
Problem
The ingress controller is the internet-facing entry point to a Kubernetes cluster. Every external HTTP request...</summary>
  </entry>
  
  <entry>
    <title>LLM Observability in Production: Monitoring Latency, Token Usage, Safety Violations, and Drift</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/llm-observability-production/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/llm-observability-production/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>LLM Observability in Production: Monitoring Latency, Token Usage, Safety Violations, and Drift
Problem
Traditional application monitoring (CPU, memory, HTTP status codes, latency) tells you nothing...</summary>
  </entry>
  
  <entry>
    <title>Crypto Mining Detection: CPU Patterns, Network Signatures, and Automated Response</title>
    <link href="https://www.systemshardening.com/articles/observability/crypto-mining-detection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/crypto-mining-detection/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Crypto Mining Detection: CPU Patterns, Network Signatures, and Automated Response
Problem
Cryptojacking is the most common post-compromise activity in Kubernetes environments. It is profitable for...</summary>
  </entry>
  
  <entry>
    <title>Building Detection Rules That Don&#39;t Cry Wolf: Alert Design for Security Events</title>
    <link href="https://www.systemshardening.com/articles/observability/detection-rules/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/detection-rules/</id>
    <published>2026-01-23T00:00:00.000Z</published>
    <updated>2026-01-23T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Building Detection Rules That Don’t Cry Wolf: Alert Design for Security Events
Problem
Security detection that generates 50+ false positives per day is worse than no detection, it trains the team to...</summary>
  </entry>
  
  <entry>
    <title>Hardening Model Serving Frameworks: TorchServe, Triton, and vLLM Security Configuration</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/model-serving-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/model-serving-hardening/</id>
    <published>2026-01-22T00:00:00.000Z</published>
    <updated>2026-01-22T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Hardening Model Serving Frameworks: TorchServe, Triton, and vLLM Security Configuration
Problem
Model serving frameworks ship with defaults optimised for development: management APIs exposed on all...</summary>
  </entry>
  
  <entry>
    <title>Securing Fine-Tuning Pipelines: Data Isolation, Checkpoint Integrity, and Access Control</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/fine-tuning-pipeline-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/fine-tuning-pipeline-security/</id>
    <published>2026-01-21T00:00:00.000Z</published>
    <updated>2026-01-21T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Securing Fine-Tuning Pipelines: Data Isolation, Checkpoint Integrity, and Access Control
Problem
Fine-tuning pipelines are high-value targets. They consume expensive GPU hours, process proprietary...</summary>
  </entry>
  
  <entry>
    <title>GitOps Security Model: Separation of Duties, Drift Detection, and Rollback Controls</title>
    <link href="https://www.systemshardening.com/articles/cicd/gitops-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/gitops-security/</id>
    <published>2026-01-20T00:00:00.000Z</published>
    <updated>2026-01-20T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>GitOps Security Model: Separation of Duties, Drift Detection, and Rollback Controls
Problem
GitOps centralizes deployment authority in Git repositories. Tools like ArgoCD and Flux watch Git...</summary>
  </entry>
  
  <entry>
    <title>Preventing HTTP Request Smuggling: Configuration for NGINX, HAProxy, and Envoy</title>
    <link href="https://www.systemshardening.com/articles/network/request-smuggling-prevention/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/request-smuggling-prevention/</id>
    <published>2026-01-20T00:00:00.000Z</published>
    <updated>2026-01-20T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Preventing HTTP Request Smuggling: Configuration for NGINX, HAProxy, and Envoy
Problem
HTTP request smuggling exploits inconsistencies in how chained HTTP processors (reverse proxies, load balancers,...</summary>
  </entry>
  
  <entry>
    <title>Hardening the Kubernetes Scheduler: Topology Constraints and Security-Aware Placement</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/scheduler-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/scheduler-hardening/</id>
    <published>2026-01-19T00:00:00.000Z</published>
    <updated>2026-01-19T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Hardening the Kubernetes Scheduler: Topology Constraints and Security-Aware Placement
Problem
The Kubernetes scheduler places pods on nodes based on resource availability and basic constraints. By...</summary>
  </entry>
  
  <entry>
    <title>Certificate Expiry Monitoring: Automated Detection Across TLS, mTLS, and Signing Certificates</title>
    <link href="https://www.systemshardening.com/articles/observability/certificate-expiry-monitoring/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/certificate-expiry-monitoring/</id>
    <published>2026-01-19T00:00:00.000Z</published>
    <updated>2026-01-19T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Certificate Expiry Monitoring: Automated Detection Across TLS, mTLS, and Signing Certificates
Problem
Certificate expiry is the most common cause of preventable production outages. When a TLS...</summary>
  </entry>
  
  <entry>
    <title>Incident Response Runbooks: Structured Procedures for Common Security Events</title>
    <link href="https://www.systemshardening.com/articles/observability/incident-response-runbooks/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/incident-response-runbooks/</id>
    <published>2026-01-19T00:00:00.000Z</published>
    <updated>2026-01-19T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Incident Response Runbooks: Structured Procedures for Common Security Events
Problem
Detection without documented response is security theatre. Most teams have alerts that fire at 3 AM, but no written...</summary>
  </entry>
  
  <entry>
    <title>AI Credential Delegation: Short-Lived Tokens, Scope Narrowing, and Audit Trails for Agent Access</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-credential-delegation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-credential-delegation/</id>
    <published>2026-01-18T00:00:00.000Z</published>
    <updated>2026-01-18T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Credential Delegation: Short-Lived Tokens, Scope Narrowing, and Audit Trails for Agent Access
Problem
AI agents need credentials to do useful work: database passwords, API keys, Kubernetes service...</summary>
  </entry>
  
  <entry>
    <title>AppArmor Profiles for Custom Applications: From Complain Mode to Enforce</title>
    <link href="https://www.systemshardening.com/articles/linux/apparmor/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/apparmor/</id>
    <published>2026-01-18T00:00:00.000Z</published>
    <updated>2026-01-18T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>AppArmor Profiles for Custom Applications: From Complain Mode to Enforce
Problem
AppArmor is the default mandatory access control system on Ubuntu and Debian. It restricts applications to specific...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Audit Log Analysis: What to Log, How to Query, and What to Alert On</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/audit-log-analysis/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/audit-log-analysis/</id>
    <published>2026-01-17T00:00:00.000Z</published>
    <updated>2026-01-17T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Audit Log Analysis: What to Log, How to Query, and What to Alert On
Problem
Kubernetes audit logs record every request to the API server: who made the request, what they asked for, and...</summary>
  </entry>
  
  <entry>
    <title>systemd Unit Hardening: ProtectSystem, PrivateTmp, and the Full Sandbox Toolkit</title>
    <link href="https://www.systemshardening.com/articles/linux/systemd-unit-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/systemd-unit-hardening/</id>
    <published>2026-01-17T00:00:00.000Z</published>
    <updated>2026-01-17T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>systemd Unit Hardening: ProtectSystem, PrivateTmp, and the Full Sandbox Toolkit
Problem
systemd provides over 30 security-relevant directives for sandboxing services, yet the vast majority of unit...</summary>
  </entry>
  
  <entry>
    <title>HTTP Security Headers in Production: CSP, HSTS, and Permissions-Policy Without Breaking Your App</title>
    <link href="https://www.systemshardening.com/articles/network/http-security-headers/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/http-security-headers/</id>
    <published>2026-01-17T00:00:00.000Z</published>
    <updated>2026-01-17T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>HTTP Security Headers in Production: CSP, HSTS, and Permissions-Policy Without Breaking Your App
Problem
Security headers are free, server-side controls that instruct browsers to restrict dangerous...</summary>
  </entry>
  
  <entry>
    <title>Hardening WebSocket Connections: Authentication, Rate Limiting, and Origin Validation</title>
    <link href="https://www.systemshardening.com/articles/network/websocket-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/websocket-hardening/</id>
    <published>2026-01-16T00:00:00.000Z</published>
    <updated>2026-01-16T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>Hardening WebSocket Connections: Authentication, Rate Limiting, and Origin Validation
Problem
WebSocket connections start as an HTTP upgrade request and then persist as a long-lived, full-duplex...</summary>
  </entry>
  
  <entry>
    <title>Centralized Logging Architecture for Security: Fluentd, Vector, and Loki Compared</title>
    <link href="https://www.systemshardening.com/articles/observability/centralized-logging/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/centralized-logging/</id>
    <published>2026-01-16T00:00:00.000Z</published>
    <updated>2026-01-16T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Centralized Logging Architecture for Security: Fluentd, Vector, and Loki Compared
Problem
Self-managed log infrastructure is one of the highest operational costs for small-to-medium teams. The choice...</summary>
  </entry>
  
  <entry>
    <title>Securing Model Artifact Pipelines: From Training to Serving</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/model-artifact-pipelines/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/model-artifact-pipelines/</id>
    <published>2026-01-15T00:00:00.000Z</published>
    <updated>2026-01-15T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Securing Model Artifact Pipelines: From Training to Serving
Problem
Model files are opaque binaries ranging from 1GB to over 1TB. You cannot code-review a set of weights. An attacker who tampers with...</summary>
  </entry>
  
  <entry>
    <title>Building a Security Audit Log Pipeline That Scales: auditd to Elasticsearch</title>
    <link href="https://www.systemshardening.com/articles/observability/audit-log-pipeline/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/observability/audit-log-pipeline/</id>
    <published>2026-01-13T00:00:00.000Z</published>
    <updated>2026-01-13T00:00:00.000Z</updated>
    <category term="observability"/>
    <summary>Building a Security Audit Log Pipeline That Scales: auditd to Elasticsearch
Problem
Linux audit logs are the ground truth for security investigation. auditd captures kernel-level events that no...</summary>
  </entry>
  
  <entry>
    <title>AI Incident Reporting: Detection, Classification, and Response Procedures for AI System Failures</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/ai-incident-reporting/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/ai-incident-reporting/</id>
    <published>2026-01-12T00:00:00.000Z</published>
    <updated>2026-01-12T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>AI Incident Reporting: Detection, Classification, and Response Procedures for AI System Failures
Problem
Traditional incident response assumes failures are binary: the service is up or it is down, the...</summary>
  </entry>
  
  <entry>
    <title>Claude for Security Incident Triage: Rapid Analysis of Logs, Alerts, and Blast Radius</title>
    <link href="https://www.systemshardening.com/articles/ai-landscape/claude-incident-triage/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/ai-landscape/claude-incident-triage/</id>
    <published>2026-01-12T00:00:00.000Z</published>
    <updated>2026-01-12T00:00:00.000Z</updated>
    <category term="ai-landscape"/>
    <summary>Claude for Security Incident Triage: Rapid Analysis of Logs, Alerts, and Blast Radius
Problem
When a security alert fires at 2 AM, the on-call engineer faces an information overload problem. The alert...</summary>
  </entry>
  
  <entry>
    <title>Security Hardening for Small Teams: Prioritising Controls When You Cannot Do Everything</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/hardening-small-teams/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/hardening-small-teams/</id>
    <published>2026-01-12T00:00:00.000Z</published>
    <updated>2026-01-12T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Security Hardening for Small Teams: Prioritising Controls When You Cannot Do Everything
Problem
A team of 1-5 engineers cannot implement 100 hardening controls simultaneously. Most hardening guides...</summary>
  </entry>
  
  <entry>
    <title>RLHF Data Protection: Securing Human Feedback Loops, Preference Data, and Reward Models</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/rlhf-data-protection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/rlhf-data-protection/</id>
    <published>2026-01-12T00:00:00.000Z</published>
    <updated>2026-01-12T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>RLHF Data Protection: Securing Human Feedback Loops, Preference Data, and Reward Models
Problem
Reinforcement Learning from Human Feedback (RLHF) pipelines introduce unique security surfaces that...</summary>
  </entry>
  
  <entry>
    <title>SLSA Provenance for Container Images: From Build to Admission Control</title>
    <link href="https://www.systemshardening.com/articles/cicd/slsa-provenance/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cicd/slsa-provenance/</id>
    <published>2026-01-11T00:00:00.000Z</published>
    <updated>2026-01-11T00:00:00.000Z</updated>
    <category term="cicd"/>
    <summary>SLSA Provenance for Container Images: From Build to Admission Control
Problem
Without provenance, you cannot prove where a container image came from, what source code it was built from, or whether the...</summary>
  </entry>
  
  <entry>
    <title>AI API Key Management: Rotation, Scoping, and Abuse Detection</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-api-key-management/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-api-key-management/</id>
    <published>2026-01-11T00:00:00.000Z</published>
    <updated>2026-01-11T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>AI API Key Management: Rotation, Scoping, and Abuse Detection
Problem
AI services have turned API keys into direct spending controls. A leaked OpenAI or Anthropic key can generate thousands of dollars...</summary>
  </entry>
  
  <entry>
    <title>Prompt Injection Defence in Production: Input Validation, Output Filtering, and Monitoring</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/prompt-injection/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/prompt-injection/</id>
    <published>2026-01-11T00:00:00.000Z</published>
    <updated>2026-01-11T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Prompt Injection Defence in Production: Input Validation, Output Filtering, and Monitoring
Problem
Prompt injection is the SQL injection of AI systems, the most common and most damaging attack class...</summary>
  </entry>
  
  <entry>
    <title>Filesystem Mount Options That Matter: noexec, nosuid, nodev, and Beyond</title>
    <link href="https://www.systemshardening.com/articles/linux/filesystem-mount-options/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/linux/filesystem-mount-options/</id>
    <published>2026-01-08T00:00:00.000Z</published>
    <updated>2026-01-08T00:00:00.000Z</updated>
    <category term="linux"/>
    <summary>Filesystem Mount Options That Matter: noexec, nosuid, nodev, and Beyond
Problem
Default Linux installations mount most filesystems with permissive options. On a stock Ubuntu 24.04 or RHEL 9...</summary>
  </entry>
  
  <entry>
    <title>gRPC Security in Production: TLS, Authentication, and Interceptor-Based Access Control</title>
    <link href="https://www.systemshardening.com/articles/network/grpc-security/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/network/grpc-security/</id>
    <published>2026-01-08T00:00:00.000Z</published>
    <updated>2026-01-08T00:00:00.000Z</updated>
    <category term="network"/>
    <summary>gRPC Security in Production: TLS, Authentication, and Interceptor-Based Access Control
Problem
gRPC services in production frequently run with security configurations that would never be acceptable...</summary>
  </entry>
  
  <entry>
    <title>Network Segmentation for AI Training Infrastructure</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/ai-training-network-segmentation/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/ai-training-network-segmentation/</id>
    <published>2026-01-07T00:00:00.000Z</published>
    <updated>2026-01-07T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Network Segmentation for AI Training Infrastructure
Problem
AI training clusters frequently share networks with production services. A training job that can reach the production database is one...</summary>
  </entry>
  
  <entry>
    <title>Migrating from Self-Managed Kubernetes to a Managed Provider Without Losing Your Security Posture</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/migrate-to-managed-k8s/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/migrate-to-managed-k8s/</id>
    <published>2026-01-06T00:00:00.000Z</published>
    <updated>2026-01-06T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Migrating from Self-Managed Kubernetes to a Managed Provider Without Losing Your Security Posture
Problem
Self-managed Kubernetes clusters (kubeadm, k3s, kops) consume 8-16 hours per month of...</summary>
  </entry>
  
  <entry>
    <title>Observability for LLM Applications: Token Usage, Latency Anomalies, and Output Classification</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/llm-observability/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/llm-observability/</id>
    <published>2026-01-05T00:00:00.000Z</published>
    <updated>2026-01-05T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Observability for LLM Applications: Token Usage, Latency Anomalies, and Output Classification
Problem
LLM-powered applications have unique observability requirements that standard APM tools do not...</summary>
  </entry>
  
  <entry>
    <title>Model Registry Access Control: Versioning, Signing, and Promotion Gates</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/model-registry-access-control/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/model-registry-access-control/</id>
    <published>2026-01-03T00:00:00.000Z</published>
    <updated>2026-01-03T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Model Registry Access Control: Versioning, Signing, and Promotion Gates
Problem
Model registries are the bridge between training and production. A model pushed to the production registry gets served...</summary>
  </entry>
  
  <entry>
    <title>Hardening Redis in Production: Authentication, TLS, ACLs, and Command Restriction</title>
    <link href="https://www.systemshardening.com/articles/cross-cutting/redis-hardening/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/cross-cutting/redis-hardening/</id>
    <published>2026-01-01T00:00:00.000Z</published>
    <updated>2026-01-01T00:00:00.000Z</updated>
    <category term="cross-cutting"/>
    <summary>Hardening Redis in Production: Authentication, TLS, ACLs, and Command Restriction
Problem
Redis defaults prioritise developer convenience: no authentication, no TLS, all 200+ commands available, and...</summary>
  </entry>
  
  <entry>
    <title>Kubernetes Service Account Token Security: Bound Tokens, Projected Volumes, and OIDC</title>
    <link href="https://www.systemshardening.com/articles/kubernetes/service-account-tokens/" rel="alternate" type="text/html"/>
    <id>https://www.systemshardening.com/articles/kubernetes/service-account-tokens/</id>
    <published>2026-01-01T00:00:00.000Z</published>
    <updated>2026-01-01T00:00:00.000Z</updated>
    <category term="kubernetes"/>
    <summary>Kubernetes Service Account Token Security: Bound Tokens, Projected Volumes, and OIDC
Problem
Every pod in Kubernetes receives a service account token by default. In clusters running older...</summary>
  </entry>
  
</feed>
