My Blog

Empowering developers since 2015. Real articles, real insights.
Cloud and DevOps solutions that will save you hours.

    11 configurations you must make to secure your Azure Storage Accounts

    Storage accounts are often the security weak point in an Azure environment. You must actively harden them against insider threats, data exfiltration, and external attack vectors.

    Data protection in Azure must be layered. To truly secure your data, you need a defense-in-depth strategy that covers authentication, network isolation, encryption, and recovery.

    I have compiled this 11-point non-negotiable checklist to help you lock down your Azure Storage Accounts. These configurations cover the critical control plane and data plane settings you need to implement today.

    Read the complete article

    Azure Networking - Six steps to secure network design

    Based on my experience, these are the 6 core steps that ensure your Azure network environment is not only secure today but scalable for the long term.

    Read more about my essential blueprint for building enterprise-grade Azure architectures.

    Read the complete article

    Entra ID and Azure Taxonomy - Designing a clean cloud structure

    Designing a clear Azure structure requires deciding which taxonomy level should enforce Azure Policy, RBAC, and isolation. This article presents the hierarchy from Entra ID Tenant down to Azure Resources, explains where to apply governance, and gives practical tips you can use to build a maintainable cloud structure.

    As the diagram shows, the first takeaway is that Microsoft Entra ID is the identity management branch and Azure is the resource governance branch.

    Read the complete article

    Fixing the "Cannot connect to backend server" error in Azure Application Gateway health checks

    When an Application Gateway reports backend health check failures, a frequent but easy-to-miss cause is a TLS negotiation mismatch between the gateway and the backend. This article shows how to diagnose the problem, align TLS settings and probes, validate the fix, and codify the correct configuration in IaC.

    Read the complete article

    A Guide to Compile-Time, Template, and Runtime Expressions in Azure Pipelines

    Azure Pipelines support two types of expressions to control pipeline behavior: compile-time expressions (evaluated at pipeline creation) and runtime expressions (evaluated during pipeline execution). Template expressions, a subcategory of compile-time, help you create reusable pipeline components.

    The key takeaway: Use compile-time expressions with parameters for fixed values needed at pipeline creation, and runtime expressions with variables for dynamic behavior based on execution state.

    Want to dive deeper into all this terminology? Read along to learn all the details.

    Read the complete article