☁️ Cloud, Kubernetes, and Infrastructure Security
Why this block exists: Use this block for cloud control planes, IAM and secrets in infrastructure, Terraform and posture management, Kubernetes hardening, and platform-runtime controls.
This page is a navigation anchor for the grouped v7.6 sidebar. It does not replace the original domain sections. It helps readers enter the KB through a smaller number of high-signal buckets, then drill down into subdomains and finally into individual articles.
Sections in this block
| Section | What you will find there |
|---|---|
| Infrastructure and Cloud Security | Existing domain section kept intact and now grouped under this larger navigation block. |
| Container and Kubernetes Security | Existing domain section kept intact and now grouped under this larger navigation block. |
How to use this block
- Start with the section cover page that best matches your current problem.
- Open the specific child article only after you know the domain you are in.
- Use search when you already know the exact topic or artifact name.
---Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.