Introduction In my blog post, https://fredrkl.com/blog/privileged-identity-management-for-azure-resources/, I looked at privileged identity management in Azure, specifically for Azure resources. This gives users time-limited access to certain…
Leave a Commentfredrkl Posts
Introduction Azure’s Privileged Identity Management (PIM) is an essential service that helps manage the security of your organization’s resources. It allows you to effectively manage,…
Leave a CommentIntroduction Container registries play a crucial role in developing and deploying cloud-native software applications. They act as repositories to store and distribute container images, which…
Leave a CommentIn Terraform 1.6, Terraform Test was rearchitected and reintroduced. This feature offers a structured and automated way for users to write and execute tests against…
Leave a CommentIntroduction Creating diagrams is essential for understanding and discussing complicated structures and processes in software development, but creating and maintaining them can be tedious and…
Leave a CommentIntroduction I have previously blogged about the book Software Architecture for Developers by Simon Brown, where he breaks Software architecture into structure and vision. I…
Leave a CommentIntroduction In the blog post-https://fredrkl.com/blog/private-aks-access/, I mentioned the Azure Bastion service to safely and securely access a jump-host with only private IP. But what security…
Leave a CommentIntroduction There are many ways to create a secure internal developer platform, e.g., following the aspect-oriented programming model and giving the developers free guardrails and…
Leave a CommentIntroduction In the Private VS Public AKS security concerns – fredrkl blog post, we examined the difference between public and private AKS API servers. Let’s…
Leave a CommentIntroduction Continuous integration (CI) workflows enable us to streamline the process of integrating changes and catching errors. But what if we could bring some of…
Leave a Comment