Secrets management: the unsung hero of secure and efficient software development. Brian Vallelunga joined The Convergence Podcast to dive into the challenges dev teams face with API keys, database credentials, and the high stakes of poor product security. From Twitter’s breaches to Toyota’s slip-ups, Brian shares lessons learned and practical steps to avoid becoming the next headline. If you’re a senior engineer, DevOps lead, or executive, this one’s packed with actionable insights. https://lnkd.in/g2qws8Br
Doppler’s Post
More Relevant Posts
-
Are manual configuration updates and scattered secrets slowing you down? These common challenges—like inconsistent environments, tedious secret rotations, and debugging headaches—are signs of outdated practices in configuration management. We recently explored why these issues persist and how they impact teams in Part 1 of our blog series. P.S: Stay tuned for part 2 for practical solutions 🤫
Are you seeing these symptoms in your current way of managing secrets and variables? → Manually replicating configurations across environments, leading to errors and inconsistencies? → Struggling with secret rotations, risking security and causing downtime? → Lacking visibility into environment-specific overrides, making debugging deployments tedious? If any of these sound familiar, this blog is for you. Read here: https://lnkd.in/gVGW2eRq In Part 1, we explore why traditional configuration management falls short and the real-world challenges teams face. (Spoiler: The solutions are coming soon in Part 2!) Already solved these problems in your workflow? DM me your insights! I’d love to learn from your approach and feature your ideas in my next post. Facets.cloud Pravanjan Choudhury Rohit Raveendran
To view or add a comment, sign in
-
🚀 Key Learnings from Prabesh .( Senior SRE ) talks in PlatformCON hosted by Luca Galante in June .Check out Platform Engineering for more content . • 𝐂𝐈/𝐂𝐃 is the modern way of delivering high quality code which changes more frequently and more reliably using a continuous iterative process and iterative process to build , test and deploy to avoid bugs and code failures . • Security 𝐆𝐨𝐚𝐥𝐬 and 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐞𝐬 in 𝐂𝐈/𝐂𝐃 Goals are Protecting code from Malicious Actors , Preventing Data Leaks, Maintaing the security policies for CI/CD Pipeline ,Quality Assurance of Code Practices • Code Repository access restriction and using audited code • Reviewing Code efficiently • Maximizing Test Accuracy using SonarQube and Codecov • Image Scanning and Repository Auditing • Implementing Safe Deployments using various deployment strategies 𝐃𝐎𝐂𝐊𝐄𝐑 𝐒𝐂𝐎𝐔𝐓 • 𝐃𝐨𝐜𝐤𝐞𝐫 𝐒𝐜𝐨𝐮𝐭 is like the Security Guard for Container Images as it scans each layer of image (A docker build consist of series of ordered build instructions , each instructions get roughly translated to image layer) , identifying software components and checking them against database on known vulnerabilities . • 𝐃𝐨𝐜𝐤𝐞𝐫 𝐒𝐜𝐨𝐮𝐭 is a Security Scanner on Steroids 💉 !! 😂 • 𝐃𝐨𝐜𝐤𝐞𝐫 𝐒𝐜𝐨𝐮𝐭 uses SBOM( a nested inventory of ingredient that makes up software components like dependencies)to cross reference with streaming CVE data to surface vulnerability and potential remediation • 𝐃𝐨𝐜𝐤𝐞𝐫 𝐒𝐜𝐨𝐮𝐭 uses scans for a event driven model ie if a new vulnerability affecting your images is announced scout shows your updated risks within seconds • Key Features of 𝐃𝐨𝐜𝐤𝐞𝐫 𝐒𝐜𝐨𝐮𝐭 are Unified View , Event driven vulnerability updates, In context remediation recommendation .
Securing CI/CD Pipeline with Docker Scout: A DevSecOps Approach to Software Supply Chain Security
https://www.youtube.com/
To view or add a comment, sign in
-
Effective logging is more than just capturing errors—it’s about building a solid foundation for troubleshooting and system visibility. This checklist dives into structured logging, traceability, and alerting strategies to prevent small issues from becoming major problems. By following these best practices, you’ll save time and reduce complexity in your workflows. Miss out, and you could be missing critical insights that make debugging easier and faster. https://lnkd.in/dXVZfzNg
An Engineer’s Checklist of Logging Best Practices
https://www.honeycomb.io
To view or add a comment, sign in
-
🔒 Struggling with Kubernetes user authentication and RBAC? You’re not alone! In our blog, we explore why so many teams find Kubernetes access control challenging and how Portainer simplifies it. From intuitive RBAC settings to streamlined user authentication, Portainer helps you get secure access management right from the start—keeping your clusters safe and efficient. 🔗 Read the blog: https://bit.ly/3C0o6Xg #Portainer #Kubernetes #RBAC #UserAuthentication #DevOps #CloudComputing
Why Most Teams Get Kubernetes User Authentication and RBAC Wrong (And How Portainer Fixes It)
portainer.io
To view or add a comment, sign in
-
What are the challenges with Kubernetes Operators? 1. 𝐂𝐨𝐦𝐩𝐥𝐞𝐱𝐢𝐭𝐲 𝐢𝐧 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭 - Building Operators require in-depth knowledge of Kubernetes internals, APIs, and controller patterns. - Designing robust logic to handle edge cases and errors is non-trivial. 2. 𝐌𝐚𝐢𝐧𝐭𝐞𝐧𝐚𝐧𝐜𝐞 𝐎𝐯𝐞𝐫𝐡𝐞𝐚𝐝 - Operators need frequent updates to remain compatible with newer Kubernetes versions. - Keeping up with changes in dependencies or application requirements adds to the workload. 3. 𝐑𝐞𝐬𝐨𝐮𝐫𝐜𝐞 𝐂𝐨𝐧𝐬𝐮𝐦𝐩𝐭𝐢𝐨𝐧 - Poorly designed Operators can lead to excessive resource usage, impacting cluster performance. - Mismanagement of control loops may cause unnecessary API server interactions. 4. 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 𝐚𝐧𝐝 𝐃𝐞𝐛𝐮𝐠𝐠𝐢𝐧𝐠 - Testing reconciliation logic across multiple states and scenarios is challenging. - Debugging issues in distributed systems can be time-consuming. 5. 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐢𝐬𝐤𝐬 - Operators with extensive cluster permissions can pose security risks if exploited. - Misconfigurations or vulnerabilities can lead to cluster-wide impacts. 6. 𝐋𝐢𝐦𝐢𝐭𝐞𝐝 𝐑𝐞𝐮𝐬𝐚𝐛𝐢𝐥𝐢𝐭𝐲 - Operators are often highly application-specific, limiting their use in other contexts. 7. 𝐒𝐜𝐚𝐥𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐈𝐬𝐬𝐮𝐞𝐬 - Managing multiple Operators for different applications can lead to operational overhead in large clusters. 8. 𝐂𝐥𝐮𝐬𝐭𝐞𝐫 𝐃𝐞𝐩𝐞𝐧𝐝𝐞𝐧𝐜𝐢𝐞𝐬 - Operators depend on specific Kubernetes features, which may not be available in all environments (e.g., managed Kubernetes services). 9. 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐚𝐧𝐝 𝐎𝐛𝐬𝐞𝐫𝐯𝐚𝐛𝐢𝐥𝐢𝐭𝐲 - Monitoring Operator performance and ensuring proper observability is crucial but can be complex to implement.
To view or add a comment, sign in
-
What are the challenges with Kubernetes Operators? 1. 𝐂𝐨𝐦𝐩𝐥𝐞𝐱𝐢𝐭𝐲 𝐢𝐧 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭 - Building Operators require in-depth knowledge of Kubernetes internals, APIs, and controller patterns. - Designing robust logic to handle edge cases and errors is non-trivial. 2. 𝐌𝐚𝐢𝐧𝐭𝐞𝐧𝐚𝐧𝐜𝐞 𝐎𝐯𝐞𝐫𝐡𝐞𝐚𝐝 - Operators need frequent updates to remain compatible with newer Kubernetes versions. - Keeping up with changes in dependencies or application requirements adds to the workload. 3. 𝐑𝐞𝐬𝐨𝐮𝐫𝐜𝐞 𝐂𝐨𝐧𝐬𝐮𝐦𝐩𝐭𝐢𝐨𝐧 - Poorly designed Operators can lead to excessive resource usage, impacting cluster performance. - Mismanagement of control loops may cause unnecessary API server interactions. 4. 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 𝐚𝐧𝐝 𝐃𝐞𝐛𝐮𝐠𝐠𝐢𝐧𝐠 - Testing reconciliation logic across multiple states and scenarios is challenging. - Debugging issues in distributed systems can be time-consuming. 5. 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐢𝐬𝐤𝐬 - Operators with extensive cluster permissions can pose security risks if exploited. - Misconfigurations or vulnerabilities can lead to cluster-wide impacts. 6. 𝐋𝐢𝐦𝐢𝐭𝐞𝐝 𝐑𝐞𝐮𝐬𝐚𝐛𝐢𝐥𝐢𝐭𝐲 - Operators are often highly application-specific, limiting their use in other contexts. 7. 𝐒𝐜𝐚𝐥𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐈𝐬𝐬𝐮𝐞𝐬 - Managing multiple Operators for different applications can lead to operational overhead in large clusters. 8. 𝐂𝐥𝐮𝐬𝐭𝐞𝐫 𝐃𝐞𝐩𝐞𝐧𝐝𝐞𝐧𝐜𝐢𝐞𝐬 - Operators depend on specific Kubernetes features, which may not be available in all environments (e.g., managed Kubernetes services). 9. 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐚𝐧𝐝 𝐎𝐛𝐬𝐞𝐫𝐯𝐚𝐛𝐢𝐥𝐢𝐭𝐲 - Monitoring Operator performance and ensuring proper observability is crucial but can be complex to implement.
To view or add a comment, sign in
-
Running a production grade Kubernetes environment can be challenging. I made a quick overview of how a typical Kubernetes Prod looks like 👇 𝟭. 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗖𝗼𝗻𝘁𝗮𝗶𝗻𝗲𝗿 𝗢𝗿𝗰𝗵𝗲𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻 with sophisticated management capabilities including scheduling, service discovery, load balancing, lifecycle management, rolling updates, rollbacks, and scaling 𝟮. 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗦𝗰𝗮𝗹𝗶𝗻𝗴 with cluster auto-scaling and pod autoscaling 𝟯. 𝗟𝗼𝗮𝗱 𝗕𝗮𝗹𝗮𝗻𝗰𝗶𝗻𝗴 with advanced routing, service mesh, and Ingress 𝟰. 𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝘆 with DNS-based and API-based approaches 𝟱. 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗢𝗯𝘀𝗲𝗿𝘃𝗮𝗯𝗶𝗹𝗶𝘁𝘆 with monitoring, logging, and distributed tracing 𝟲. 𝗥𝗼𝗯𝘂𝘀𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗠𝗲𝗮𝘀𝘂𝗿𝗲𝘀 with: - TLS Encryption - Security Policies - Secrets Management - Container Runtime Security - Image Vulnerability Scanning - RBAC and Fine-grained Permissions - Network Segmentation and Isolation 𝟳. 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗲𝗱 𝗗𝗲𝗽𝗹𝗼𝘆𝗺𝗲𝗻𝘁𝘀: - GitOps Practices - CI/CD Integration - Deployment Strategies (rolling updates, blue-green deployments, canary deployments etc.,) 𝟴. 𝗛𝗶𝗴𝗵 𝗔𝘃𝗮𝗶𝗹𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗮𝗻𝗱 𝗙𝗮𝘂𝗹𝘁 𝗧𝗼𝗹𝗲𝗿𝗮𝗻𝗰𝗲 with: - Persistent Storage - Self-healing mechanisms - Automatic Pod Rescheduling - Disaster Recovery Procedures - Multi-region Cluster Deployment - Replication controllers and replica sets Kubernetes is deep and complex and this is just a tip of the iceberg. 🔁 Consider a Repost if this is useful.
To view or add a comment, sign in
-
Focused Labs Principal DevOps Engineer Micah Adams shared his insights on the continued importance of DevOps in 2024, especially in light of recent major tech outages. Check out his latest article, "Why We're Still Talking About DevOps in 2024," featured in DEVOPSdigest to learn how to reassess and strengthen your DevOps practices! https://lnkd.in/gdxzKt3h
DEVOPSdigest
devopsdigest.com
To view or add a comment, sign in
-
[Webinar] Are developers meant to double as security engineers? Can your CISO genuinely assure no NHI credential leaks are happening? Is open-source software going to adequately solve these challenges? Join Ashur Kanoon for "The Secret to No Secrets: Making Secretless Workload IAM a Reality" to discover: 🔍 Eradicating credential leaks 💡 Unveiling the true cost of "free" ⚙️ Streamlining DevOps without sacrificing security 📅 Date: July 25 🕛 Time: 12:00 p.m. PT 🎟️ Register now ➡ https://bit.ly/4bPKgYu
The Secret to No Secrets: Making Secretless Workload IAM a Reality
brighttalk.com
To view or add a comment, sign in
-
📢 Last chance to sign up! Managing secrets securely is a crucial yet often overlooked aspect of software development, leading to challenging questions and scenarios. We address and provide solutions to those at noon PT today! 👇
[Webinar] Are developers meant to double as security engineers? Can your CISO genuinely assure no NHI credential leaks are happening? Is open-source software going to adequately solve these challenges? Join Ashur Kanoon for "The Secret to No Secrets: Making Secretless Workload IAM a Reality" to discover: 🔍 Eradicating credential leaks 💡 Unveiling the true cost of "free" ⚙️ Streamlining DevOps without sacrificing security 📅 Date: July 25 🕛 Time: 12:00 p.m. PT 🎟️ Register now ➡ https://bit.ly/4bPKgYu
The Secret to No Secrets: Making Secretless Workload IAM a Reality
brighttalk.com
To view or add a comment, sign in
6,388 followers