In my previous article about terraform, I explain what is terraform and what it can do. Also, I explain how to set it up and how we can use it with Azure to simplify infrastructure configuration. If you didn’t read it before you can view it using this link
In this post, we are going to look further in to Azure infrastructure setup using terraform.
Before that lets look in to sample…
This week I was testing Terraform, a simple tool which can use to automate Azure resource deployment.
It will be easier to explain terraform with a real-world example. I am developing a web application and as my resource provider I am using Azure. my first requirement is to setup a development environment. For that I need at least one web server, one database server and connectivity between…
Symantec released their latest Internet Security Threat Reportin early June. This report includes data about infrastructure threats for year 2016. It says, for year 2016, near 1.1 billion identities has been exposed. Also for last 8 years total identity breach is around 7.1 billion which is almost equal to total world population.
In Identity infrastructure breach, most of the time…
When it comes to manage access to resources in infrastructure, there are two main questions we usually ask.
“Who” is the user and “What” resources?
Is it allow or deny access?
Answers to above questions are enough to define the base rules. But depending on the tools and technologies that can use to manage the access, we will have additional questions which will…