Blog

Securing your Code for Production

When designing cloud-native security, you should start with the assumption that all systems can be compromised. The 4Cs (Cloud, Cluster, Container, Code) of cloud-native security adopt the defense in depth approach and divides it into four layers.

Posted July 8, 2021 by Sharjeel Aziz ‐ 3 min read

#4cs #cloud #coding #secure #security

Container Scanning with Trivy in Jenkins

With unrelenting attacks from malicious hackers on business critical software and infrastructure, the "Shift-left" approach for security testing is gaining more momentum inside the enterprises.

Posted July 2, 2021 by Faheem Memon ‐ 4 min read

#container #scanner #security #trivy

Introduction to Terraform

After almost seven (7) years in development, 11,000 pull requests, and 100 million downloads, Hashicorp Terraform has finally reached general availbility. Terraform has become a tool of choice for many DevOps teams for infrastructure provisioning and configuration. In this post we will review Terraform basics and write our frist Terraform script.

Posted July 2, 2021 by Faheem Memon ‐ 6 min read

#terraform

Admission Control in Kubernetes

Admission controllers are essential for security, governance, and configuration management in Kubernetes.

Posted June 28, 2021 by Sharjeel Aziz ‐ 7 min read

#authentication #authorization #kubernetes

Kubernetes Authorization

Authorization grants you access permission for resources in the cluster. A Kubernetes cluster will only authorize your requests after authentication.

Posted June 11, 2021 by Sharjeel Aziz ‐ 6 min read

#authorization #kubernetes

Kubernetes Authentication

Authentication in Kubernetes is about verifying the identity of users and services.

Posted June 4, 2021 by Sharjeel Aziz ‐ 4 min read

#authentication #kubernetes