Organically DevOps: Building Quality and Security into the Software Supply Chain at Liberty Mutual

This talk looked at about transformation to Continuous Integration, Continuous Delivery, and DevOps. For a large, heavily regulated industry, this task can not only be daunting, but viewed by many as impossible. Often, organizations try to reduce the friction through micro-fixes, but Eddie’s team asked how to change the culture to reduce the friction and concluded with the following final points: Don’t mandate DevOps. Give employees the chance to master their discipline with examples to set and follow. Favor deep end-to-end accomplishments over broad but incremental steps forward. Focus on taking the right teams far before encouraging broad adoption. Centralize the platforms and tools that your teams shouldn’t be thinking about. Provide foundational services/commodities and let teams stay on purpose. Incorporate contributions from everyone; don’t stifle autonomy. Stay open to new ways of working. Challenge security policies, but respect intentions. Find new ways to enforce concerns without abandoning precaution.

November 8, 2016 · 1 min · Vadzim Belski
AWS CDK why to use it

AWS CDK why to use it

AWS CDK: Streamlining Cloud Infrastructure for Developers, CTOs, and Architects The AWS Cloud Development Kit (CDK) is a powerful tool that simplifies cloud infrastructure provisioning and management. It empowers developers, CTOs, and architects to define and deploy cloud resources using familiar programming languages. With the CDK, teams can leverage the benefits of Infrastructure as Code (IaC) while maintaining a consistent and efficient development workflow. Introduction The AWS CDK offers numerous advantages that make it an attractive choice for organizations seeking to streamline their cloud infrastructure management. By leveraging the CDK, teams can enjoy increased productivity, enhanced collaboration, and improved scalability. This introduction provides an overview of the key benefits that the AWS CDK brings to developers, CTOs, and architects, setting the stage for an in-depth exploration of this powerful tool. ...

October 28, 2024 · 18 min · Vadzim Belski

Wireguard VPN on DigitalOcean

Embark on a secure networking journey with our simplified setup guide for deploying WireGuard VPN on DigitalOcean. Our comprehensive scripts and step-by-step instructions streamline the process, empowering you to establish a robust VPN infrastructure swiftly and seamlessly. Key Features Automated Deployment: Our scripts automate the provisioning of essential resources, including server creation, package installation, and configuration of WireGuard VPN. Customization Options: Tailor the deployment to your specific requirements with customizable parameters for IP addressing, port configurations, and security settings. ...

May 11, 2022 · 2 min · Vadzim Belski

Kubernetes containers integrity monitoring

Integrity Monitoring for Containerized Applications: Ensuring Security Through Hash Functions Containerized applications have revolutionized software deployment, but they also present unique security challenges. One crucial aspect of container security is integrity monitoring. This blog post explores how to implement robust integrity monitoring using hash functions to protect your containerized applications from malicious modifications. What is Integrity Monitoring? Integrity monitoring is a security process that checks a container’s file system for unauthorized changes. It ensures that files haven’t been maliciously modified, updated, or added. If any compromises are detected, the system can automatically roll back the deployment to a previous, secure version. ...

February 11, 2021 · 2 min · Vadzim Belski