DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Avatar

Tiexin Guo

Staff Software Engineer at Flexport

CN

Joined Oct 2021

Stats

Reputation: 644
Pageviews: 102.0K
Articles: 17
Comments: 0
  • Articles

Articles

article thumbnail
The New Frontier in Cybersecurity: Embracing Security as Code
Security as Code (SaC) is often used with DevSecOps, but what does it mean exactly? Learn best practices for a more secure dev process.
December 27, 2023
· 5,273 Views · 2 Likes
article thumbnail
How to Handle Secrets in Helm
Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today!
November 17, 2023
· 4,864 Views · 1 Like
article thumbnail
Handling Secrets With AWS Secrets Manager
Better understand AWS Secrets Manager, how it works under the hood, and how to access it from Kubernetes clusters.
October 13, 2023
· 4,505 Views · 2 Likes
article thumbnail
Securing Your CI/CD: An OIDC Tutorial
The article introduces OpenID Connect (OIDC) as a means to employ short-lived tokens for improved security.
October 8, 2023
· 3,024 Views · 3 Likes
article thumbnail
Platform Engineering: Building Your Developer Portal With Backstage (Part 1)
Build a developer portal from scratch with Backstage, an open platform. In this tutorial, learn how to create a secure-by-default software catalog.
July 11, 2023
· 2,078 Views · 1 Like
article thumbnail
Supply Chain Security: What Is SLSA? Part I
Attacks on software supply chains have evolved into dangerous threats. Let’s discuss the SLSA framework to understand where supply chain security is headed.
March 9, 2023
· 4,221 Views · 1 Like
article thumbnail
Open Policy Agent With Kubernetes: Part 2
In this second part of the miniseries, we will see how to get a deeper integration between OPA and Kubernetes with Gatekeeper and native CRD-based policies.
February 22, 2023
· 3,761 Views · 1 Like
article thumbnail
Open Policy Agent With Kubernetes: Part 1
In this article, readers will get started with policy as code by writing an OPA (Open Policy Agent) policy for a Kubernetes environment with guide code.
February 22, 2023
· 3,949 Views · 1 Like
article thumbnail
What Is Policy-as-Code? An Introduction to Open Policy Agent
Learn the benefits of policy as code and start testing your policies for cloud-native environments.
January 26, 2023
· 10,678 Views · 2 Likes
article thumbnail
A Brief Introduction to SBOM and How to Use It With CI
Learn more about SBOM (Software Bills of Materials), why you should use it, what the standards are, and how to automate it with Continuous Integration.
December 19, 2022
· 5,971 Views · 1 Like
article thumbnail
A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a Functionary
Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you.
November 3, 2022
· 6,629 Views · 2 Likes
article thumbnail
Managing AWS IAM With Terraform: Part 2
In this second part, learn how to centralize IAM for multiple AWS accounts, create and use EC2 instance profiles, and implement just-in-time access with Vault.
October 11, 2022
· 4,448 Views · 2 Likes
article thumbnail
Managing AWS IAM With Terraform: Part 1
Covering the basics of managing AWS IAM with Terraform and learn how to delete the Root/User Access key, enforce MFA, customize password policy, and more.
October 11, 2022
· 4,430 Views · 1 Like
article thumbnail
AWS IAM Security Best Practices
Identity and access management is a pillar of security. With the advent of the cloud, it got a lot more complicated.
June 13, 2022
· 5,870 Views · 3 Likes
article thumbnail
9 Extraordinary Terraform Best Practices That Will Change Your Infra World
This article aims to deliver something genuinely new: a fresh take on Terraform, Infrastructure as Code, and how to finally make it work for your needs.
May 24, 2022
· 5,637 Views · 1 Like
article thumbnail
Kubernetes Hardening Tutorial Part 3: Logging and Auditing
Learn how to set up an AWS EKS cluster with Terraform and leverage best practices to configure roles, service accounts, logging, and auditing with useful tools.
March 25, 2022
· 4,888 Views · 3 Likes
article thumbnail
Kubernetes Hardening Tutorial Part 1: Pods
In my previous articles, we discussed Kubernetes security and enhancing K8s. Today, we'll get a deeper understanding of Kubernetes Pods security with this first tutorial.
January 6, 2022
· 5,197 Views · 6 Likes

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: