Select Page
magdysalem_1-1618267540439.png

How-To: Deploy Microservice Application with Pod Identity Using Helm Chart

In the last blog we discussed how to deploy AKS fully integrated with AAD. Also we discussed deploying add-on for Azure Pod Identity and Azure CSI driver. In the article we will discuss how to create an application that using ... continue reading
magdysalem_0-1617211808512.png

HOW-TO: Deploy AKS with POD Managed Identity and CSI using Terraform and Azure Pipeline

Today as we develop and run application in AKS, we do not want credentials like database connection strings, keys, or secrets and certificates exposed to the outside world where an attacker could take advantage of those secrets for malicious purposes ... continue reading
magdysalem_0-1611613203893.png

Secure Application Lifecycle – Part 3 – Azure Sentinel

In the past part 1 and part 2, I discussed how we can monitor the security and health of our subscription manually. Also, we used Microsoft tools to find security issues with the subscription and discussed how we could resolve ... continue reading
magdysalem_0-1611108265970.png

Secure Application Lifecycle – Part 2- Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the ... continue reading
Picture1.png

Secure Application Lifecycle – Part 1 – Using CredScan

Cyber Security topic is one the most important topics in our mind when we develop application and systems on-perm or in cloud in general. It is important to frequently perform and install security validations on applications. There are two important ... continue reading