SiddiquimohammadAzure : Managed Identity , types and importanceIn the realm of cloud security and access management, Azure offers a robust solution known as Managed Identities.Jul 1Jul 1
SiddiquimohammadDOCKER FILE — Security Checklist & its importance in DevSecOpsDocker file is often written during the build phase of your application when a developer wants to deploy the code to a testing environmentJun 231Jun 231
SiddiquimohammadAPI Security — DevSecOpsIn previous discussion we understood the ways for a secure API designMar 26Mar 26
SiddiquimohammadAPI Security — ModelIn previous article we understood the importance of API security and the common vulnerabilities faced by the APIsMar 16Mar 16
SiddiquimohammadAPI Security — IntroductionAPIs are the entry point for accessing an organization’s functions and data.Mar 16Mar 16
SiddiquimohammadUnderstanding DevSecOps the Easy wayIndeed, the image above captures reality. For many organizations, DevOps and Security are never in the same boat. Some may be confused…Mar 13Mar 13
SiddiquimohammadAKS network policy for a Azure hosted microservice applicationIn previous article we understood the basics of Network Policies . Let’s begin implementing for a Microservice architecture hosted on…Mar 4Mar 4
SiddiquimohammadGetting started with AKS Network PoliciesAn important part of Container Security mechanism ‘Network Policy’ plays a very vital role in securing your cluster . It can help you to…Feb 92Feb 92
SiddiquimohammadDefense in Depth and DevSecOpsDefense in depth is a layered security approach where a number of security mechanism come together at different layers to protect your…Jan 25Jan 25