While Kubernetes offers enhanced pace, portability, and the ability to use microservices architectures, they can also introduce security vulnerabilities and broaden the attack surface. To make it more secure and robust, Kube cluster should be designed and architected keeping security as the primary aspect.

In this article, we will set…

Digitization is evolving the businesses to adopt modern approaches in their IT infrastructure. This is the reason everyone talks about speed, agility and time to market, but security is the least discussed and focussed part of the infrastructure.

DevSecOps takes care of continuous security along with continuous integration and deployment…

Many Organisations neglect necessary security measures while designing their IT infrastructure and end up with a chaotic approach to incident management and mitigation. Security mostly works with the 20:80 rule, where 20% of the time spent on implementing security will make the environment 80% secure.

We hear a lot about…

Nowadays, Organisations are following the digital transformation path and making strategies to modernise their applications to run in PAAS or containers. Refactoring an application in this fashion achieves many benefits of the cloud.

If we talk specifically about cloud environments, Azure App Service is among the famous choices. Deploying a…

Application Load Balancer provides a mature solution for layer 7 load balancing of HTTP and HTTPS traffic. It supports request routing based on HTTP headers, HTTP methods, HTTP query parameters and source IP CIDRs in addition to the host header and path-based routing.

The ability to route based on any…

Microservices have become hugely popular in recent years. Mainly, because they come with a couple of benefits that are super useful in the era of containerization and cloud computing. The vast majority (around 78%) are using Kubernetes for running microservices.

The popularity of Kubernetes is no longer limited to early…

Golden Rule — If you want to minimize the probability of error, just automate the process.

Creating a new AWS account and set up the key baselines and guardrails manually can be a bit challenging, but when your Organization’s(Company) footprints are growing into AWS and every 15 days a new…

Setting up security in the cloud is of utmost importance. A security breach is a nightmare for any organization and a proactive security approach is the best possible way to prevent security breaches from happening. But, response methods in case of security breach also carries an equal weightage.

I will…

Increasing popularity and adoption of the cloud is catching the eye of all the businesses from startups to big enterprises. Now, the question arises “Is the cloud safe?” and the plain answer is “Depends”. As cloud works on the shared responsibility model, security becomes the top priority. But, the cloud…

Shailender Choudhary

Lead Cloud and DevSecOps Consultant at SoftwareONE Australia

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store