Abishek Kafledevops.abisec.xyz·Oct 8, 2024Terminate EC2 InstanceTasks Delete the ec2 instance named xfusion-ec2 present in us-east-1 region. Before submitting your task, make sure instance is in terminated state. Steps Select the ec2 instance name xfusion-ec2. Select Instance and then Instance State → Ter...DiscussCloud PlatformsAWS
sifytechnologiessifysifytechnologiessify.hashnode.dev·Oct 7, 2024Sify’s DevSecOps Services: Integrating Security into the Heart of DevelopmentIn today’s fast-paced digital world, security is no longer an afterthought — it is a crucial part of every phase of the software development lifecycle. Sify’s DevSecOps Services combine the principles of Development (Dev), Security (Sec), and Operati...DiscussDevSecOps
Deepak parashartechfordummys.hashnode.dev·Oct 7, 2024Enhance Security with DevSecOps Tools: StackStorm, Calico, AWS & Veracode ExplainedIn the fast-paced world of software development, security has become one of the biggest priorities. While DevOps has revolutionized how we build and deploy applications by integrating development and operations, DevSecOps takes this further by integr...Discussveracode
Mushtaq Smbmushtaq.hashnode.dev·Oct 3, 2024SAST - Level Up Your DevSecOps GameIntegrating security into the SDLC (Software Development Life Cycle) is like having Deadpool as your bodyguard—always ready to kick some butt before things go haywire. The SDLC is broken down into three main stages: conceptualize, develop, and releas...DiscussDevops
sifytechnologiessifysifytechnologiessify.hashnode.dev·Oct 3, 2024Sify's DevSecOps Services: Accelerating Secure Development in the Digital EraIn today's digital landscape, speed and security are paramount for enterprises navigating rapid technological change. Traditional approaches to software development and security are no longer sufficient to keep up with modern business demands. That’s...DiscussDevSecOps
Subhanshu Mohan Guptablogs.subhanshumg.com·Oct 2, 2024Ensuring PCI-DSS, POPI, GDPR, and HIPAA Compliance in Kubernetes SystemsIntroduction Welcome to Part IV of my Kubernetes series, where we delve into building compliant systems on Kubernetes to meet stringent regulatory standards such as PCI-DSS, POPI, GDPR, and HIPAA. As businesses continue to adopt containerized environ...Discuss·10 likesMastering Kubernetes: Revolutionizing Cloud-Native Operationspcidss
Vishwajeet Singhvishsig.hashnode.dev·Oct 3, 2024An Introduction to Prometheus for Effective DevOps MonitoringGet to know about monitoring Monitoring is an essential practice in DevOps. Through the use of diverse monitoring strategies and methodologies, developers can improve several aspects of a distributed system, including failure rates, error occurrences...DiscussDevops
Mushtaq Smbmushtaq.hashnode.dev·Oct 2, 2024DevSecOps - Static Code AnalysisStatic code analysis is a method used to examine and evaluate the code without executing it. It involves analyzing the source code to identify potential errors, vulnerabilities, and code quality issues. This process helps in detecting bugs, security...DiscussDevSecOps
Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 1, 2024How We Prevent Privilege Escalation with AWS IAM Permission Boundaries (A Practical DevOps Guide)In environments like ours, it’s crucial to strike a balance between DevOps flexibility and tight security controls. Imagine a scenario where DevOps members can create admin roles for team members—but, we need to ensure that these admins cannot furthe...Discuss·4 likespermission boundaries
Sharon Jebitokjebitok.hashnode.dev·Sep 30, 2024Introduction to DevSecOpsThe last weeks have been moving so fast that I couldn’t get time to publish the next writeups for TryHackMe. It has been an interesting experience so far and worth the time and effort. In this article, I’m writing the writeups for the Introduction ...DiscussDevSecOps