Find vulns in your code before they find you

Episode

Find vulns in your code before they find you

In this session, Chris is joined by DeveloperSteve Coochin, a Developer Advocate at Snyk. In this episode, Chris and Steve talk about vulns in the wild for a bit (well and to geek out in general), especially on the back of some research that Steve did recently on the likes of PHP. Steve has recently …

Developer Dependencies DevSecOps Security

Tales from the real world

Chris Reddington DeveloperSteve Coochin Published on Wed, Aug 18, 2021

Why you should be using Azure Security Center

Blog

Why you should be using Azure Security Center

Whether you’re brand new to Azure or have been using it for some time, you have likely either heard of - or come across - Azure Security Center. It’s a service which can prove extremely valuable in baselining, measuring and improving your security posture. But, did you know there is …

DevSecOps Security Azure Monitoring Cloud Governance

Chris Reddington Published on Mon, Aug 16, 2021

44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

Episode

44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

When using Azure Kubernetes Service (AKS), there’s a chance that kubenet might be the only possible choice due to your requirements. If so, you may still want to use Application Gateway Ingress Controller (AGIC) to leverage Azure Application Gateway’s Web Application Firewall (WAF) …

Azure Kubernetes Service Azure Application Gateway Kubernetes Security Managed Identities AKS

Chris Reddington David Frappart Published on Fri, Aug 13, 2021

Azure role-based access control (RBAC) at the data plane level

Blog

Azure role-based access control (RBAC) at the data plane level

Principal of least privilege is a commonly used phrase within the Technology Industry. The idea is that we’ll assign permissions of what the user needs to get the job done, rather than anything broader or more privileged. This helps reduce the blast radius in the event of a compromised …

Azure Identity Security AKS Kubernetes Azure Kubernetes Service Azure Storage Azure CosmosDB Azure Key Vault Managed Identities RBAC

Chris Reddington Published on Wed, Apr 21, 2021

Optimise your site - Addressing recommendations from securityheaders.com

Blog

Optimise your site - Addressing recommendations from securityheaders.com

Introduction

In my blog post earlier this week, I mentioned that I recently spoke at the Northern Azure User Group. The other speaker for the evening was Scott Hanselman, who talked about his journey moving a 17 year old .NET App into Azure. This was his blog. Along the way, he called out some of …

Web Development Security Blogging How To Azure Storage Static Content

Chris Reddington Published on Wed, Apr 14, 2021

33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

Episode

33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

How often do you think about the configuration of your applications across environments/regions/deployment boundaries? What if that configuration was stored somewhere externally but centralised, to make management easier? That’s the idea behind the external config pattern! How about another …

Architecture APIs Cloud Design Patterns Security Azure Architecture Center Messaging

Architecting for the cloud, one pattern at a time

Chris Reddington Peter Piper Published on Fri, Apr 2, 2021

Using GPG Keys to sign Git Commits - Part 4

Blog

Using GPG Keys to sign Git Commits - Part 4

Part 4 - The final part (at least for now, until I find somewhere else that we can expand on with this)! This part will focus on porting the keys that we have recently generated onto our YubiKey device. I own a YubiKey NEO, so I’ll be using that.

Note: Be aware that the YubiKey NEO has a …

Technology DevOps Git Security Authentication

Chris Reddington Published on Wed, Mar 17, 2021

Using GPG Keys to sign Git Commits - Part 3

Blog

Using GPG Keys to sign Git Commits - Part 3

Okay, part 3! At this point, I’m assuming that you have already familiarised yourself with part 1 and part 2 of the series. As a quick recap, part 1 focused on why we would consider using GPG Keys in general. Part 2 focused on how to generate GPG keys along with some recommended practices on …

Technology DevOps Git Security Authentication How To

Chris Reddington Published on Wed, Mar 10, 2021

29 - The Sidecar and Ambassador Patterns

Episode

29 - The Sidecar and Ambassador Patterns

Have a need to update a legacy application to use cloud concepts such as retry, circuit breaker or other features? Then the ambassador or sidecar patterns may be for you! Join Peter and Chris as they continue their journey exploring Cloud Design Patterns. In this session, they discuss the Sidecar …

Architecture APIs Cloud Design Patterns Azure Architecture Center Security

Architecting for the cloud, one pattern at a time

Chris Reddington Peter Piper Published on Fri, Mar 12, 2021

Using GPG Keys to sign Git Commits - Part 2

Blog

Using GPG Keys to sign Git Commits - Part 2

Hopefully by now you’ve had a chance to read part 1 of this series, which explains why you may be interested in using GPG keys to sign your commits. Congratulations on getting to the second part! In part two, we’re going to focus on how I worked through setting up GPG in my Windows …

Technology DevOps Git Security Windows Terminal

Chris Reddington Published on Wed, Mar 3, 2021