Modern DevSecOps

This is an article from DZone's 2023 Enterprise Security Trend Report.

For more:


Read the Report

DevSecOps — a fusion of development, security, and operations — emerged as a response to the challenges of traditional software development methodologies, particularly the siloed nature of development and security teams. This separation often led to security vulnerabilities being discovered late in the development cycle, resulting in costly delays and rework. DevSecOps aims to break down these silos by integrating security practices into the entire software development lifecycle (SDLC), from planning and coding to deployment and monitoring. 

Secure the Cluster

This is an article from DZone's 2023 Kubernetes in the Enterprise Trend Report.

For more:


Read the Report

Kubernetes security is essential in today's digital landscape. With the increasing adoption of containerization and microservices, Kubernetes has become the go-to solution for orchestrating and managing containers. However, this also means that it has become a target for attackers, making Kubernetes security a top priority. The dynamic and complex nature of Kubernetes requires a proactive and comprehensive approach to security. This involves securing the Kubernetes cluster itself, the workloads running on it, and the entire CI/CD pipeline. It's important to ensure secure configurations, enforce least privilege access, isolate workloads, scan for vulnerabilities regularly, and encrypt sensitive data. 

Risk Assessment Using Blockchain

Blockchain technology is an emerging technology field, and to explore its wide use of application, several companies have a dedicated research teams for the same. One such field that could take advantage of this technology is risk assessment. Blockchain technology can help in creating a secure and decentralized system that can be used to manage risks. These assessments, if performed, have the potential to be considered more accurate and trustworthy than any external audits.

Risk assessment is an important activity to align that is often listed as a part of an organization's security strategy policy and procedures. It starts with the analysis of the company's various assets resulting in the identification of potential risks and vulnerabilities. The likelihood and impact of the identified risks are evaluated. The security team then develops strategies to mitigate or manage them. The risk assessment process requires extensive collaboration with multiple stakeholders and is both time-consuming and resource intensive. 

A Practical Guide for Container Security

This is an article from DZone's 2023 Containers Trend Report.

For more:


Read the Report

As containerized architecture gains momentum, businesses are realizing the growing significance of container security. While containers undeniably offer profound benefits, such as portability, flexibility, and scalability, they also introduce unprecedented security challenges. In this report, we will address the fundamental principles and strategies of container security and delve into two specific methods — secrets management and patching. Additionally, we will examine tools and techniques for securing keys, tokens, and passwords. 

Guarding Against Threats: Examining the Strengths and Applications of Modern Security Models

In the world of computing, security plays a crucial role in safeguarding resources. Over the past decade, various security models have been created to ensure the confidentiality, integrity, and availability of information. They present methods that organizations can adopt to establish formal policies for information security. These policies aim to provide a structured approach for deploying security measures and practices to safeguard sensitive information and prevent security breaches. Having knowledge about different security models, their features, and their suitability for specific situations is crucial. It enables one to make informed decisions on selecting the appropriate security model that can effectively address security concerns and protect computational resources. 

Access Control Models

One of the most utilized models, Access Control, is designed to assist in the creation of policies related to system/user-level access for diverse resources such as files, databases, and networks. The rule of thumb is to only provide access to the entity that they need to perform their duties. This model encompasses three main types of controls; Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role-based Access Control (RBAC). With DAC, a resource owner has the capability to decide 'who can access what?'. For example, the owner of a file decides who they want to grant access to and in what capacity (editing or viewing rights). Due to its versatility and ease of use, the DAC model is commonly adopted by smaller organizations.

Security Architecture Review on a SASE Solution

Vendor security assessments can be very complex, especially when it comes to analyzing modern solutions. Obsolete threat modeling principles and frameworks become extremely unreliable and tricky as complexity increases. Security analysis also becomes further intricate as it is not limited to the application's inherent design but also how it is integrated with any organization's core network. Implementation and configuration induces vulnerabilities in the system if security is not a part of the development lifecycle. Recent trends suggest that organizations are now moving to SASE solutions, replacing existing vendors that provide services like CASB (Cloud access security broker), DLP (Data Loss Prevention), proxy solutions, etc.

What is SASE?

Secure Access Service Edge (SASE) is a framework that provides network convergence alongside security services. It adds security to the ingress and egress network traffic. The technology stack usually comprises CASB, DLP, SWG (Secure Web Gateway), FWaaS (Firewall as a Service), NGFW (Network Firewall), SDN (Software Defined Networking), and ZTNA (Zero Trust Network Architecture) solutions.