DevSecOps: Integrating Security into DevOps โ€“ Part 8

Continuing from our previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Continuous Compliance Continuous compliance is a practice that involves integrating compliance requirements into the software development lifecycle. By doing so, organizations can ensure that their software complies with regulatory requirements and internal security policies. Continuous compliance includes the following activities: […]

Read more โ†’

DecSecOps: Integrating Security into DevOps โ€“ Part 9 – The Final – Application Security and Immutable Infrastructure for DevSecOps

This is a final series to conclude and summarize the key topics covered in previous 8 blogs: DevSecOps is an approach to software development that emphasizes integrating security into every stage of the software development lifecycle. Application security and immutable infrastructure are two key practices that can help organizations achieve this goal. Application Security Application […]

Read more โ†’

Introduction to Docker and Containers: A Beginner’s Guide

Containers are a popular technology for developing and deploying applications. They provide an isolated runtime environment that runs an application and its dependencies, making it easier to package, deploy, and manage the application. Docker is a platform for managing containers that has become very popular in recent years. In this article, we’ll provide an introduction […]

Read more โ†’

Diving Deeper into Docker: Exploring Dockerfiles, Commands, and OCI Specifications

Docker is a popular platform for developing, packaging, and deploying applications. In the previous blog, we provided an introduction to Docker and containers, including their benefits and architecture. In this article, we’ll dive deeper into Docker, exploring Dockerfiles, Docker commands, and OCI specifications. Dockerfiles Dockerfiles are text files that contain instructions for building Docker images. […]

Read more โ†’

Azure Kubernetes Service (AKS) – Managed Identity

Azure Kubernetes Service (AKS) is a fully managed Kubernetes container orchestration service provided by Microsoft Azure. It allows users to quickly and easily deploy, manage, and scale containerized applications on Azure. AKS has been a popular choice among developers and DevOps teams for its ease of use and its ability to integrate with other Azure […]

Read more โ†’

AKS Workload Identity

AKS workload identity is a feature of Azure Kubernetes Service (AKS) that enables you to use Azure Active Directory (AAD) to manage access to Azure resources from within a Kubernetes cluster. In this blog post, we’ll explore how AKS workload identity works and how to use it with an example code. How does AKS workload […]

Read more โ†’