Skip to content
logo
Defence blues
Securing the container storage interface
  • Red tradecraft
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Blue team @Purpleteaming
    • Blue team @SOC
    • Blue team for dev
      • Securing web applications
      • Development security operations
        • Where the magic (and the mayhem) happens
          • A SysEngineer’s ongoing journey
          • The story sofar
          • Growing list of challenges
          • SSDLC methodologies
          • Implementing SSDLC
          • Risk assessment
          • Privacy Impact Assessment (PIA)
          • Threat modelling
          • Secure coding
          • Security-testing plan and practices
          • Security automation
          • Shared responsibility
          • Securing virtual machines
          • Securing managed database services
          • Securing containers
          • Securing serverless/function as a service
          • Securing object storage
          • Securing block storage
          • Securing file storage
          • Securing the container storage interface
            • Related
          • Securing virtual networking
          • Securing VPN services
          • Securing DDoS protection services
          • Identity management
        • From code to cloud without the exploits: A CI/CD security fairy tale
        • Protecting an Amazon cloud kingdom from barbarians (and Dave)
        • Defending Microsoft’s mansion from uninvited guests
        • Keeping Google’s playground from turning into a Hackfest
        • Playing On-Prem sysadmin in nightmare mode
    • Blue team @Home
    • Bulletproofing servers
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans
    • Related

    Securing the container storage interface¶

    A Container Storage Interface (CSI) is a standard driver for connecting container orchestration systems such as Kubernetes to block and file storage from various cloud providers.

    Related¶

    • AWS: Basis for a secure AWS deployment pipeline

    • Azure: Foundation for a secure Azure deployment pipeline

    • GCP: Foundation for a secure GCP deployment pipeline

    • On-prem: Secure on-premises CI/CD pipeline (Hetzner, Finland)

    2026-04-01 20:54
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7