Optimise your site - Addressing recommendations from securityheaders.com

Blog

Optimise your site - Addressing recommendations from securityheaders.com

Introduction

In my blog post earlier this week, I mentioned that I recently spoke at the Northern Azure User Group. The other speaker for the evening was Scott Hanselman, who talked about his journey moving a 17 year old .NET App into Azure. This was his blog. Along the way, he called out some of …

Website Security Blogging

Chris Reddington Published on Wed, Apr 14, 2021

33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

Episode

33 - External Config and Claim Check Pattern - Easier Management and Externalising Payloads

How often do you think about the configuration of your applications across environments/regions/deployment boundaries? What if that configuration was stored somewhere externally but centralised, to make management easier? That’s the idea behind the external config pattern! How about another …

Architecture APIs Cloud Design Patterns Security

Architecting for the cloud, one pattern at a time

Chris Reddington Peter Piper Published on Fri, Apr 2, 2021

Using GPG Keys to sign Git Commits - Part 4

Blog

Using GPG Keys to sign Git Commits - Part 4

Part 4 - The final part (at least for now, until I find somewhere else that we can expand on with this)! This part will focus on porting the keys that we have recently generated onto our YubiKey device. I own a YubiKey NEO, so I’ll be using that.

Note: Be aware that the YubiKey NEO has a …

Technology DevOps Git Security

Chris Reddington Published on Wed, Mar 17, 2021

Using GPG Keys to sign Git Commits - Part 3

Blog

Using GPG Keys to sign Git Commits - Part 3

Okay, part 3! At this point, I’m assuming that you have already familiarised yourself with part 1 and part 2 of the series. As a quick recap, part 1 focused on why we would consider using GPG Keys in general. Part 2 focused on how to generate GPG keys along with some recommended practices on …

Technology DevOps Git Security

Chris Reddington Published on Wed, Mar 10, 2021

29 - The Sidecar and Ambassador Patterns

Episode

29 - The Sidecar and Ambassador Patterns

Have a need to update a legacy application to use cloud concepts such as retry, circuit breaker or other features? Then the ambassador or sidecar patterns may be for you! Join Peter and Chris as they continue their journey exploring Cloud Design Patterns. In this session, they discuss the Sidecar …

Architecture APIs Cloud Design Patterns Security

Architecting for the cloud, one pattern at a time

Chris Reddington Peter Piper Published on Fri, Mar 12, 2021

Using GPG Keys to sign Git Commits - Part 2

Blog

Using GPG Keys to sign Git Commits - Part 2

Hopefully by now you’ve had a chance to read part 1 of this series, which explains why you may be interested in using GPG keys to sign your commits. Congratulations on getting to the second part! In part two, we’re going to focus on how I worked through setting up GPG in my Windows …

Technology DevOps Git Security

Chris Reddington Published on Wed, Mar 3, 2021

Using GPG Keys to sign Git Commits - Part 1

Blog

Using GPG Keys to sign Git Commits - Part 1

For a while now, I’ve been using GPG Keys to sign my Git Commits to prove that my commits on GitHub are genuine and from me. Over the last few weeks, I’ve been inspired by a couple of colleagues (Kudos to Adrian and Julie if you’re reading this) to dig out my YubiKey and use these …

Technology DevOps Git Security

Chris Reddington Published on Wed, Feb 24, 2021

23 - Gatekeeper and Valet Key Patterns - Secure your APIs and Resources

Episode

23 - Gatekeeper and Valet Key Patterns - Secure your APIs and Resources

You may have joined Peter and Chris in some of their previous episodes such as the API Economy, The Backends for Frontends & Strangler Pattern, or The Anti-Corruption Layer, Gateway Aggregation and Gateway Routing patterns. They’ll will be continuing our journey talking about API Cloud …

Architecture APIs Cloud Design Patterns Security

Architecting for the cloud, one pattern at a time

Chris Reddington Peter Piper Published on Fri, Jan 22, 2021

13 - Tales from the Real World - Defying DDOS

Episode

13 - Tales from the Real World - Defying DDOS

When building solutions in the cloud, security is often a pillar that we hear come up in the requirements discussion. But how does that translate into the real world? Particularly defending against DDOS attacks? Check out this episode, where Cam Adams joins Chris and talks about some of the recent …

Security DDOS

Tales from the real world

Chris Reddington Cam Adams Published on Fri, Oct 30, 2020

8 - Azure Security

Episode

8 - Azure Security

Hello, and welcome back to Cloud with Chris! You’re with me, Chris Reddington - and we’ll be talking about all things Cloud!

In this episode, we get back to a requirements based topic, and an area that will significantly impact the design of our resulting solution architecture. That …

Security Architecture DevOps

Podcast episodes

Chris Reddington Andrew Nathan Published on Sun, Jun 7, 2020