1.
About
2.
Index
3.
Application Development and Lifecycle
3.1.
DevOps
3.2.
Qualification
3.3.
Requirements
3.4.
Architecture
3.4.1.
Micro Services
3.5.
Development
3.6.
Verification
3.6.1.
Static Code Analysis
3.6.2.
Software Testing
3.6.3.
Dependency Analysis
3.6.3.1.
Sbom
3.6.3.2.
Vulnerabilities
3.6.3.3.
Licenses
3.7.
Versioning
3.8.
Deployment
3.9.
Observability
3.10.
Documentation
3.10.1.
Mdbook
3.10.2.
Example
4.
Infrastructure
4.1.
Network
4.2.
DHCP and DNS
4.3.
Terraform
5.
Cryptography
5.1.
PKI
5.2.
TLS
5.3.
SSH
Light (default)
Rust
Coal
Navy
Ayu
Knowledge Base
Cryptography
Symmetric
One or more parties share the exact same key for en-/decryption
Second save channel is required to distribute the key
Typically faster than Asymmetric encryption
Algorithms: AES, TwoFish, 3DES
Asymmetric
PKI
TLS
SSH
Post-Quantum
https://www.nist.gov/blogs/taking-measure/post-quantum-cryptography-qa-nists-matt-scholl
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.html