Introduction Azure’s Privileged Identity Management (PIM) is an essential service that helps manage the security of your organization’s resources. It allows you to effectively manage,…
Leave a CommentAuthor: Fredrik Klingenberg
Computer Scientist working in Oslo for Computas AS. Studied photography at Nordic School of Photography and try to help kids with homework for the organisation "Save The Children".
Introduction Container registries play a crucial role in developing and deploying cloud-native software applications. They act as repositories to store and distribute container images, which…
Leave a CommentIn Terraform 1.6, Terraform Test was rearchitected and reintroduced. This feature offers a structured and automated way for users to write and execute tests against…
Leave a CommentIntroduction Creating diagrams is essential for understanding and discussing complicated structures and processes in software development, but creating and maintaining them can be tedious and…
Leave a CommentIntroduction I have previously blogged about the book Software Architecture for Developers by Simon Brown, where he breaks Software architecture into structure and vision. I…
Leave a CommentIntroduction In the blog post-https://fredrkl.com/blog/private-aks-access/, I mentioned the Azure Bastion service to safely and securely access a jump-host with only private IP. But what security…
Leave a CommentIntroduction There are many ways to create a secure internal developer platform, e.g., following the aspect-oriented programming model and giving the developers free guardrails and…
Leave a CommentIntroduction In the Private VS Public AKS security concerns – fredrkl blog post, we examined the difference between public and private AKS API servers. Let’s…
Leave a CommentIntroduction Continuous integration (CI) workflows enable us to streamline the process of integrating changes and catching errors. But what if we could bring some of…
Leave a CommentIntroduction In this blog post, we will explore the security considerations on whether or not to use a private or public K8s API server when…
Leave a Comment