Security Keep in touch
Using OAuth 2.0 and Terraform to secure your Azure App Service
Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.
Azure Managed Identities to enforce the security of your platform
The management of credentials and secrets is always a challenge. Learn how to delegate this issue to Azure using Managed Identities.
How to build a Docker image using Multi-Stage Builds?
Aren't you tired of creating huge contraption to optimize your Dockerfiles? Use Multi-Stage to develop a single docker image for all your environments.
Secure internal traffic with machine to machine auth on Azure
The security of your infrastructure is as strong as it’s weakest links. Learn how to secure it by adding machine to machine authentication on Azure.
DevSecOps: what tools to apply good security practices
DevSecOps allow for better and more secure applications. Fewer vulnerabilities, fewer problems. In this article, we are focusing on DevSecOps tools.
DevSecOps: apply DevOps principles to increase your system security
DevSecOps is an extension of DevOps that integrates security into the software delivery process and enables faster, safer deployment of code in production.
Kube-monkey: Bring chaos into your Kubernetes deployments.
Kube-monkey is a tool that helps you test the resilience of your Kubernetes cluster by randomly deleting pods. It allows to see how it responds to the outage.
AWS IAM: Understanding the Key Concepts of IAM services
What is AWS IAM? Accounts, users, roles, requests, policies… 5 minutes to understand AWS IAM mechanics. Use IAM to deal with identity and authorization.
The Importance of Combining DevOps and Hybrid Cloud solutions
In this article, we are focusing on the Hybrid Cloud service, what is it, what are the advantages and how to combinate successfully DevOps and Hybrid Cloud.
How to create and set up Kubernetes (k8s) secrets?
A Kubernetes secret is a resource for safely storing small chunks of data such as ssl certificate and keys, database passwords or ssh keys.