PS Product SecurityKnowledge Base

☁️ Cloud, Kubernetes, and Infrastructure Security

Why this block exists: Use this block for cloud control planes, IAM and secrets in infrastructure, Terraform and posture management, Kubernetes hardening, and platform-runtime controls.

This page is a navigation anchor for the grouped v7.6 sidebar. It does not replace the original domain sections. It helps readers enter the KB through a smaller number of high-signal buckets, then drill down into subdomains and finally into individual articles.

Sections in this block

Section What you will find there
Infrastructure and Cloud Security Existing domain section kept intact and now grouped under this larger navigation block.
Container and Kubernetes Security Existing domain section kept intact and now grouped under this larger navigation block.

How to use this block

  1. Start with the section cover page that best matches your current problem.
  2. Open the specific child article only after you know the domain you are in.
  3. Use search when you already know the exact topic or artifact name.

---Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.