The sole purpose of SSL Certificates

The sole purpose of SSL Certificates

The internet is a vast space. Your computer interacts with multiple other entities. SSL certificates play a key role in making the web a safer place.

Secure your Azure cloud with a private hub and spoke infrastructure

Secure your Azure cloud with a private hub and spoke infrastructure

Secure your Azure cloud with a private hub and spoke infrastructure with private endpoints, private DNS, Azure policy, and private DNS resolver.

What is a Pentest?

What is a Pentest?

Pentesting is one of the main activities of the Padok SecOps team. Find out what it is and how our methodology helps us organize our week.

How to encrypt data at rest with a Customer Managed Key with Terraform

How to encrypt data at rest with a Customer Managed Key with Terraform

Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.

What is Apparmor and how to add a security layer with it in Docker?

What is Apparmor and how to add a security layer with it in Docker?

AppArmor is a Linux kernel module for security which interfaces with Docker to confine applications that run in containers.

Secure your Github Actions deployments on GCP with Identity Federation

Secure your Github Actions deployments on GCP with Identity Federation

Learn how you can manually set up Identity Federation, and how doing it with Terraform can allow Github Actions to access your GCP resources.

Understand and demystify Role-based Access Control in Kubernetes

Understand and demystify Role-based Access Control in Kubernetes

Role-based Access control in Kubernetes will enable you to secure access to your cluster. Discover what is RBAC, how to use it and some great tools to help you!

Using OAuth 2.0 and Terraform to secure your Azure App Service

Using OAuth 2.0 and Terraform to secure your Azure App Service

Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.

Azure Managed Identities to enforce the security of your platform

Azure Managed Identities to enforce the security of your platform

The management of credentials and secrets is always a challenge. Learn how to delegate this issue to Azure using Managed Identities.

Create a Docker image using Multi-Stage Builds

Create a Docker image using Multi-Stage Builds

Are you tired of creating huge contraptions to optimize your Dockerfiles? Use Multi-Stage to develop a single docker image for all your environments.

Secure internal traffic with machine to machine auth on Azure

Secure internal traffic with machine to machine auth on Azure

The security of your infrastructure is as strong as it’s weakest links. Learn how to secure it by adding machine to machine authentication on Azure.

DevSecOps tools: what tools to apply good security practices?

DevSecOps tools: what tools to apply good security practices?

DevSecOps allow for better and more secure applications. Fewer vulnerabilities, fewer problems. This article focuses on DevSecOps tools.

DevSecOps: apply DevOps principles to increase your system security

DevSecOps: apply DevOps principles to increase your system security

DevSecOps is an extension of DevOps that integrates security into the software delivery process and enables faster, safer deployment of code in production.

Kube-monkey: Bring chaos into your Kubernetes deployments.

Kube-monkey: Bring chaos into your Kubernetes deployments.

Kube-monkey is a tool that helps you test the resilience of your Kubernetes cluster by randomly deleting pods. It allows to see how it responds to the outage.

AWS IAM: Understanding the Key Concepts of IAM services

AWS IAM: Understanding the Key Concepts of IAM services

What is AWS IAM? Accounts, users, roles, requests, policies… 5 minutes to understand AWS IAM mechanics. Use IAM to deal with identity and authorization.

The Importance of Combining DevOps and Hybrid Cloud solutions

The Importance of Combining DevOps and Hybrid Cloud solutions

In this article, we are focusing on the Hybrid Cloud service, what is it, what are the advantages and how to combinate successfully DevOps and Hybrid Cloud.

How to create and set up Kubernetes (k8s) secrets?

How to create and set up Kubernetes (k8s) secrets?

A Kubernetes secret is a resource for safely storing small chunks of data such as ssl certificate and keys, database passwords or ssh keys.