A Chief Architect of cloud applications at Red Hat, Christian Posta, demonstrates why it’s important to have very fine-grained control over what traffic enters your service-mesh cluster and how to use the Istio Gateway to do this.
In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.
This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.
Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
Co-author of Docker in Action, Second Edition. and the designer of scalable software systems Stephen Kuenzli explains what are Docker containers and showcases how to run them securely.
From Operations Anti-Patterns, DevOps Solutions by Jeffery D. Smith