Skip to main content

Latest Blogs

Tutorials, guides, and insights on DevOps, SRE, and Cloud technologies.

Azure Private Link, Service Endpoints, and Hub-Spoke Topology

Secure your Azure network architecture with Private Link, Service Endpoints, Hub-Spoke topology with Azure Firewall, User Defined Routes, Azure Bastion, Network Watcher, VNet integration for App Service, and ExpressRoute for hybrid connectivity.

Read article →

DevSecOps — Shift Security Left Without Slowing Down

Learn how to integrate security into every stage of your CI/CD pipeline with SAST, DAST, SCA, container scanning, and secret detection tools.

Read article →

Rootless Docker — Run Containers Without Root Privileges

Set up rootless Docker to run containers without root privileges — understand user namespaces, configure storage drivers, work around limitations, and compare rootless Docker with Podman for secure container workflows.

Read article →

Kubernetes Security — Pod Security Standards, Network Policies, and OPA

Secure your Kubernetes cluster at every layer — from Pod Security Standards and admission controllers to Network Policies, OPA Gatekeeper, RBAC hardening, secrets encryption at rest, and container image policies. Includes practical YAML examples and a security checklist.

Read article →

How Containers Actually Work — Namespaces, Cgroups, and chroot

Build a Linux container from scratch using namespaces, cgroups, and chroot. Understand the exact kernel primitives that Docker, Podman, and Kubernetes rely on under the hood.

Read article →

Terraform Security — tfsec, Checkov, and Policy as Code

Scan your Terraform code for security misconfigurations using tfsec, Checkov, OPA, and Sentinel — catch public S3 buckets, open security groups, and unencrypted resources before they ever reach your cloud account.

Read article →