<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Iac on AI-Assisted DevSecOps Workflows</title><link>https://adurrr.github.io/ai-devsecops-workflows/tags/iac/</link><description>Recent content in Iac on AI-Assisted DevSecOps Workflows</description><generator>Hugo</generator><language>en</language><atom:link href="https://adurrr.github.io/ai-devsecops-workflows/tags/iac/index.xml" rel="self" type="application/rss+xml"/><item><title>Practical Use Cases &amp; Patterns</title><link>https://adurrr.github.io/ai-devsecops-workflows/docs/use-cases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://adurrr.github.io/ai-devsecops-workflows/docs/use-cases/</guid><description>&lt;div class="alert alert-info" role="alert"&gt;&lt;div class="h4 alert-heading" role="heading"&gt;Start with CLI Tools&lt;/div&gt;


For quick operations and one-off queries, start with CLI tools (ShellGPT) before moving to pair programming or multi-agent workflows. This reduces overhead and speeds up routine tasks.
&lt;/div&gt;

&lt;h2 id="incident-response"&gt;Incident Response&lt;/h2&gt;
&lt;h3 id="scenario-container-escape-detection"&gt;Scenario: Container Escape Detection&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Situation:&lt;/strong&gt; Monitoring alert indicates potential container escape attempt&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Workflow:&lt;/strong&gt;&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Step 1: Initial reconnaissance (CLI)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;kubectl get events --sort-by&lt;span style="color:#f92672"&gt;=&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#39;.lastTimestamp&amp;#39;&lt;/span&gt; | &lt;span style="color:#ae81ff"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; sgpt &lt;span style="color:#e6db74"&gt;&amp;#34;filter for security events, suspicious activity&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Step 2: Deep investigation (Pair programming)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;aider
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&amp;gt; &lt;span style="color:#e6db74"&gt;&amp;#34;Analyze this pod&amp;#39;s security context. Check for privileged mode, 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;&amp;gt; hostPath mounts, and dangerous capabilities&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Step 3: Remediation planning (Multi-Agent)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Oracle: Assess blast radius&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Fixer: Generate hardened pod spec&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Council: Validate fix approach&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;Commands:&lt;/strong&gt;&lt;/p&gt;</description></item></channel></rss>