Blog
Securing your Code for Production
When designing cloud-native security, you should start with the assumption that all systems can be compromised. The 4Cs (Cloud, Cluster, Container, Code) of cloud-native security adopt the defense in depth approach and divides it into four layers.
Posted July 8, 2021 by Sharjeel Aziz ‐ 3 min read
Container Scanning with Trivy in Jenkins
With unrelenting attacks from malicious hackers on business critical software and infrastructure, the "Shift-left" approach for security testing is gaining more momentum inside the enterprises.
Posted July 2, 2021 by Faheem Memon ‐ 4 min read
Introduction to Terraform
After almost seven (7) years in development, 11,000 pull requests, and 100 million downloads, Hashicorp Terraform has finally reached general availbility. Terraform has become a tool of choice for many DevOps teams for infrastructure provisioning and configuration. In this post we will review Terraform basics and write our frist Terraform script.
Posted July 2, 2021 by Faheem Memon ‐ 6 min read
Admission Control in Kubernetes
Admission controllers are essential for security, governance, and configuration management in Kubernetes.
Posted June 28, 2021 by Sharjeel Aziz ‐ 7 min read
Kubernetes Authorization
Authorization grants you access permission for resources in the cluster. A Kubernetes cluster will only authorize your requests after authentication.
Posted June 11, 2021 by Sharjeel Aziz ‐ 6 min read
Kubernetes Authentication
Authentication in Kubernetes is about verifying the identity of users and services.
Posted June 4, 2021 by Sharjeel Aziz ‐ 4 min read