<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sai kiran jv </title>
    <description>The latest articles on DEV Community by sai kiran jv  (@kiranjv).</description>
    <link>https://dev.to/kiranjv</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F264457%2Fccf9ea5f-d547-4925-afbb-4e665fdfe385.png</url>
      <title>DEV Community: sai kiran jv </title>
      <link>https://dev.to/kiranjv</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kiranjv"/>
    <language>en</language>
    <item>
      <title>Lesson 2: Killing Port 22 - How to Securely Manage Linux in the Cloud</title>
      <dc:creator>sai kiran jv </dc:creator>
      <pubDate>Sun, 08 Feb 2026 17:03:24 +0000</pubDate>
      <link>https://dev.to/kiranjv/lesson-2-killing-port-22-how-to-securely-manage-linux-in-the-cloud-2d6l</link>
      <guid>https://dev.to/kiranjv/lesson-2-killing-port-22-how-to-securely-manage-linux-in-the-cloud-2d6l</guid>
      <description>&lt;p&gt;&lt;strong&gt;🚀 The Challenge&lt;/strong&gt;&lt;br&gt;
Most beginners open &lt;strong&gt;Port 22&lt;/strong&gt; to the entire world so they can SSH into their servers. This is a massive mistake. In minutes, bots will start brute-forcing your server. Today, I built a server with &lt;strong&gt;zero inbound ports.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛠️ The Solution: AWS Systems Manager (SSM)&lt;/strong&gt;&lt;br&gt;
Instead of using an SSH key (which is a file that can be leaked), I used IAM Roles.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;I gave my EC2 an IAM Identity (AmazonSSMManagedInstanceCore).&lt;/li&gt;
&lt;li&gt;I closed all inbound firewall rules.&lt;/li&gt;
&lt;li&gt;I connected via the AWS browser console.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;🐧 Hardening the OS&lt;/strong&gt;&lt;br&gt;
Once inside, I didn't just leave it "stock." I performed three critical hardening steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Patch Management: Upgraded all packages to the latest security versions.&lt;/li&gt;
&lt;li&gt;Audit: Used &lt;code&gt;ss -tulpn&lt;/code&gt; to verify that no hidden services were listening.&lt;/li&gt;
&lt;li&gt;Persistence: Enabled &lt;code&gt;dnf-automatic&lt;/code&gt; so the server self-patches security updates daily.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>linux</category>
      <category>aws</category>
      <category>security</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>Day 1: Locking the Front Door</title>
      <dc:creator>sai kiran jv </dc:creator>
      <pubDate>Sat, 07 Feb 2026 19:18:25 +0000</pubDate>
      <link>https://dev.to/kiranjv/day-1-locking-the-front-door-5gil</link>
      <guid>https://dev.to/kiranjv/day-1-locking-the-front-door-5gil</guid>
      <description>&lt;p&gt;I’ve officially started my deep dive into DevSecOps. Before I write a single line of application code or launch a server, I need to secure my base. In the cloud, Identity is the new Perimeter. If your identity management is weak, your entire infrastructure is vulnerable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The "Root" Problem&lt;/strong&gt;&lt;br&gt;
When I first created my AWS account, I had the &lt;strong&gt;Root User&lt;/strong&gt;. This user is a "God Mode" account—it can delete everything and has no restrictions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Rule #1 of DevSecOps&lt;/strong&gt;: Never use the Root user for daily tasks. It’s like carrying the master key to a skyscraper on your keychain while walking through a crowded city. If you lose it, you lose the building.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛠️ What I Did: The Hardening Checklist&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;1. MFA Everywhere&lt;/strong&gt;&lt;br&gt;
Multi-Factor Authentication (MFA) is not optional. I enabled a virtual MFA (Google Authenticator) for my Root account immediately. Even if my password leaks, a hacker can't get in without my physical phone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Created the "Daily Driver" (IAM Admin)&lt;/strong&gt;&lt;br&gt;
I created a specialized IAM user named &lt;code&gt;devsecops-admin&lt;/code&gt;. Instead of giving it "God Mode," I:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Created a User Group called &lt;code&gt;Administrators&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Attached the &lt;code&gt;AdministratorAccess&lt;/code&gt; policy to the Group, not the user (Best practice!).&lt;/li&gt;
&lt;li&gt;Added my user to that group.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Set a Custom Account Alias&lt;/strong&gt;&lt;br&gt;
Nobody wants to remember a 12-digit AWS Account ID. I created an alias so my login page is professional: &lt;code&gt;https://[my-custom-name].signin.aws.amazon.com/console&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. The "Nuclear" Option: Deleted Root Access Keys&lt;/strong&gt;&lt;br&gt;
I checked my Root user's security credentials and ensured there were zero active Access Keys. If you have keys for your Root user, delete them now. Use IAM roles or users for CLI access instead.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💡 Key Takeaway&lt;/strong&gt;&lt;br&gt;
Security isn't something you "add" at the end of a project; it starts with how you log in. By shifting security to the very first step (Identity), I’ve already reduced my account's risk by 90%.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Step&lt;/strong&gt;: Lesson 2 — Hardening the Linux OS and launching my first secure EC2 instance.&lt;/p&gt;

</description>
      <category>devsecops</category>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Beyond DevOps: My Journey to Mastering DevSecOps in 2026</title>
      <dc:creator>sai kiran jv </dc:creator>
      <pubDate>Sat, 07 Feb 2026 19:01:15 +0000</pubDate>
      <link>https://dev.to/kiranjv/beyond-devops-my-journey-to-mastering-devsecops-in-2026-1gbg</link>
      <guid>https://dev.to/kiranjv/beyond-devops-my-journey-to-mastering-devsecops-in-2026-1gbg</guid>
      <description>&lt;p&gt;In 2026, building fast isn't enough, you have to build securely. We've all seen the headlines: data breaches, leaked credentials, and supply chain attacks. As a DevSecOps engineer in training, my goal is to prove that security shouldn't be a &lt;strong&gt;bottleneck&lt;/strong&gt;. Instead, it should be an automated, invisible part of the development process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🏗️ The Project: A Cloud-Native "Fortress"&lt;/strong&gt;&lt;br&gt;
Over the next few weeks, I am building and documenting a complete, end-to-end DevSecOps pipeline. This isn't just a "Hello World" project. I will be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Hardening&lt;/strong&gt; AWS Cloud infrastructure from the ground up.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automating&lt;/strong&gt; security scans for every line of code (SAST &amp;amp; SCA).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Containerizing&lt;/strong&gt; applications with Docker and securing them with Trivy.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Orchestrating&lt;/strong&gt; with Kubernetes (Amazon EKS) using Zero-Trust policies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Defending&lt;/strong&gt; the runtime with real-time threat detection (Falco).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🗺️ The Roadmap&lt;/strong&gt;&lt;br&gt;
I have broken my learning into 6 core modules, and I'll be posting my notes and "gotchas" for every single lesson:&lt;/p&gt;

&lt;p&gt;Module 1: The Secure Foundation (Identity &amp;amp; Networking)&lt;br&gt;
Module 2: The Automation Engine (CI/CD Security)&lt;br&gt;
Module 3: Container Security (Docker &amp;amp; ECR)&lt;br&gt;
Module 4: Kubernetes Mastery (EKS &amp;amp; RBAC)&lt;br&gt;
Module 5: Infrastructure as Code (Terraform &amp;amp; Policy)&lt;br&gt;
Module 6: Observability &amp;amp; AI-Driven Defense&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🤝 Why I’m Blogging This&lt;/strong&gt;&lt;br&gt;
They say you don't truly know a topic until you can explain it to someone else. I’m "Learning in Public" to:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Solidify my knowledge&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Build a portfolio&lt;/strong&gt; that shows I can communicate technical security concepts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Help others&lt;/strong&gt; who are starting their cloud security journey.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Buckle up. In my next post (Lesson 1), we start by locking down the front door: AWS Identity and Access Management.&lt;/p&gt;

</description>
      <category>devsecops</category>
      <category>cybersecurity</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
