<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jake Neeper</title>
    <description>The latest articles on DEV Community by Jake Neeper (@jakeinthecloud).</description>
    <link>https://dev.to/jakeinthecloud</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1489206%2Ff98966fd-7d46-48a4-9f3d-6348027f20d7.jpg</url>
      <title>DEV Community: Jake Neeper</title>
      <link>https://dev.to/jakeinthecloud</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jakeinthecloud"/>
    <language>en</language>
    <item>
      <title>Importance of DevSecOps: Integrating Security into DevOps</title>
      <dc:creator>Jake Neeper</dc:creator>
      <pubDate>Wed, 19 Feb 2025 19:47:34 +0000</pubDate>
      <link>https://dev.to/jakeinthecloud/importance-of-devsecops-integrating-security-into-devops-13m</link>
      <guid>https://dev.to/jakeinthecloud/importance-of-devsecops-integrating-security-into-devops-13m</guid>
      <description>&lt;p&gt;In today's fast-paced digital world, organizations are under extensive pressure to deliver software faster and more efficiently. However, your security should never be sacrificed for speed. Traditional security approaches often lead to vulnerabilities being discovered too late in the development lifecycle. This is where DevSecOps comes into play — a methodology that integrates security into DevOps from the very beginning.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is DevSecOps?
&lt;/h2&gt;

&lt;p&gt;DevSecOps is the practice of integrating security best practices throughout the software development lifecycle (SDLC). Most traditional security models often treat security as a separate step after development, whereas DevSecOps embeds security measures from the planning phase through deployment and beyond. This ensures that security becomes a shared responsibility of developers, security teams, and operations teams.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvzsvk7l6wtcbszhzjbbw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvzsvk7l6wtcbszhzjbbw.png" alt="DevSecOpsCycle" width="726" height="471"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Principles of DevSecOps&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;em&gt;Shift-Left Security&lt;/em&gt; - Security is integrated early which becomes proactive rather than reactive.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Automation of Security Processes&lt;/em&gt; - Automated security testing and compliance checks are implemented to detect vulnerabilities in real-time.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Continuous Monitoring&lt;/em&gt; - Continuous monitoring in production to actively mitigate threats.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Team Collaboration&lt;/em&gt; - All teams work together to create secure applications.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Compliance as Code&lt;/em&gt; - Automation of security policies and compliance checks within the CI/CD pipeline.&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Why DevSecOps is Essential
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Enhances Security Without Slowing Down Development&lt;/strong&gt;&lt;br&gt;
Integrating security from the start allows teams to identify &amp;amp; fix any vulnerabilities earlier in the SDLC, which can help prevent costly and time-consuming fixes down the road.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reduces Risk of Data Breaches&lt;/strong&gt;&lt;br&gt;
With the ever-increasing risk of cyberattacks, organizations must become proactive and DevSecOps ensures that vulnerabilities are addressed &lt;em&gt;before&lt;/em&gt; they are exploited&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance and Security Check Automation&lt;/strong&gt;&lt;br&gt;
Security and compliance requirements, such as HIPAA or GDPR, can be automated using security policies and Infrastructure as Code (IaC), ensuring that applications meet the appropriate industry standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost Minimization and Delivery Efficiency&lt;/strong&gt;&lt;br&gt;
When a security issue arises in production, it is &lt;em&gt;far more expensive&lt;/em&gt; to address than if it were caught during development. Detecting and removing vulnerabilities early on can save businesses both time and money.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to Implement DevSecOps
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Integrate Security Tools in CI/CD Pipelines&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
Use SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools to automatically scan code.&lt;br&gt;
&lt;strong&gt;&lt;u&gt;Implement Security as Code&lt;/u&gt;&lt;/strong&gt; &lt;br&gt;
Define security policies using Infrastructure as Code (IaC) tools like Terraform.&lt;br&gt;
&lt;strong&gt;&lt;u&gt;Use Automated Security Scanning&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
Implement tools such as Azure Security Center or SonarQube to automate security scans.&lt;br&gt;
&lt;strong&gt;&lt;u&gt;Train Development Teams on Secure Coding Practices&lt;/u&gt;&lt;/strong&gt; &lt;br&gt;
Security awareness should be a standard part of the development culture.&lt;br&gt;
&lt;strong&gt;&lt;u&gt;Monitor and Respond to Threats&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
Use SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) solutions for real-time threat detection.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;These days, DevSecOps really isn't an option anymore. With cyber threats evolving at an alarming pace, organizations that fall short of their security posture risk serious financial and reputational damage. Embracing DevSecOps can enhance your security, accelerate your software delivery, and ensure compliance standards, ultimately leading to a more resilient and secure IT environment.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>cybersecurity</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Automation &amp; IaC in Azure: Key Benefits</title>
      <dc:creator>Jake Neeper</dc:creator>
      <pubDate>Tue, 11 Feb 2025 22:52:37 +0000</pubDate>
      <link>https://dev.to/jakeinthecloud/automation-iac-with-azure-key-benefits-520b</link>
      <guid>https://dev.to/jakeinthecloud/automation-iac-with-azure-key-benefits-520b</guid>
      <description>&lt;p&gt;As organizations scale their cloud infrastructure, managing Azure resources manually can become inefficient and error-prone. Turning your existing Azure resources into automated deployments using Infrastructure as Code Tools such as Azure's DSL 'Bicep' and Azure DevOps can offer numerous advantages.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;What is Bicep? &lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;Bicep is Microsoft's Domain Specific Language for defining Azure resources in a clean and human-readable way. Unlike most traditional ARM templates, Bicep simplifies syntax, improves maintainability, and eliminates the complexity of JSON. &lt;br&gt; &lt;br&gt;
One of the biggest advantages of Bicep is its incredible reusability through abstraction. Bicep has incredible versatility when it comes to modularizing and parameterizing its code which allows the same code to be used in multiple environments.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;Automation with Azure DevOps &lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;By leveraging CI/CD pipelines, you can automate resource provisioning with minimal human intervention and Azure DevOps can enable seamless deployments and continuous integration. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Benefits of Azure DevOps&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Consistency &amp;amp; Reliability: Avoid configuration drift by enforcing standardized deployments&lt;/li&gt;
&lt;li&gt;Continuous Deployment: Automate resource updates with version control&lt;/li&gt;
&lt;li&gt;Security &amp;amp; Compliance: Enforce policies, access control, and audits for any infrastructure changes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Faster Deployments &amp;amp; Easier Rollbacks&lt;/strong&gt;&lt;br&gt;
Since Azure DevOps uses Git for their repositories, storing your Bicep files within allows for version control and makes it easy to track changes and roll back to previous versions if necessary.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;Cost &amp;amp; Efficiency Gains &lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;One of the most attractive reasons to automate your Azure resources is the significant impact on cost efficiency and operational effectiveness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reduced Operational Overhead&lt;/strong&gt;&lt;br&gt;
One of the challenges of traditional provisioning is that it requires dedicated engineering time, which can increase labor costs. &lt;br&gt;&lt;br&gt;
IaC eliminates the need for manual configurations which reduces repetitive tasks and thus freeing up engineers for other priorities. Automated deployments can also ensure that every environment is provisioned &lt;b&gt;identically&lt;/b&gt; which can reduce post-deployment troubleshooting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Preventing Over-Provisioning &amp;amp; Resource Waste&lt;/strong&gt;&lt;br&gt;
Without automation, resources are often created inconsistently, leading to over-provisioning (allocating more capacity than needed). &lt;br&gt;&lt;br&gt;
Bicep templates standardize resource sizes &amp;amp; configurations, ensuring efficient resource creation. Azure DevOps pipelines can also integrate cost management tools that can &lt;b&gt;auto-scale resources&lt;/b&gt; based on increasing (or decreasing) demand. Combining these with Azure Policies can help protect your cost-saving strategies.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;Final Thoughts &lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Key Takeaway&lt;/b&gt;: Automation Saves More Than Just Money &lt;br&gt;&lt;br&gt;
Automating your Azure resources not only drives cost savings but also enhances efficiency, security, and consistency while reducing errors and manual effort. By transforming your existing resources into an IaC driven environment, you can streamline deployments, optimize resource allocation, and free up teams to focus on innovation and business growth. This approach is essential for any organization looking to scale efficiently in the cloud.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>devops</category>
      <category>automation</category>
    </item>
    <item>
      <title>Understanding RTO &amp; RPO in Disaster Recovery</title>
      <dc:creator>Jake Neeper</dc:creator>
      <pubDate>Mon, 20 May 2024 19:38:17 +0000</pubDate>
      <link>https://dev.to/jakeinthecloud/understanding-rto-rpo-in-disaster-recovery-3oe8</link>
      <guid>https://dev.to/jakeinthecloud/understanding-rto-rpo-in-disaster-recovery-3oe8</guid>
      <description>&lt;p&gt;One of the key aspects to cloud security when protecting your data is Disaster Recovery. When it comes to recovery, it is broken down into two key metrics in continuity planning. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recovery Time Objective&lt;/li&gt;
&lt;li&gt;Recovery Point Objective&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;What is Recovery Time Objective (RTO)?&lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;The RTO is defined by the amount of time it should take to restore any lost data, applications or systems after an outage or accident. This timeframe is usually measured from when the incident occurs to complete recovery. &lt;br&gt;
The idea behind establishing an RTO is to set a goal in order to minimize downtime and disruption in services. This goal is determined by the main question of: &lt;br&gt;
&lt;em&gt;"What is the maximum amount of downtime you can afford?"&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;What is Recovery Point Objective (RPO)?&lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;RPOs are defined by the point in time in which you restore your data from. For instance, if a company has set an RPO of 8 hours, that typically means a backup of their data is set to occur every 8 hours. In the event of a disaster that results in lost data, that company will only lose 8 hours of new data that was added from the time of backup to the incident. &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;u&gt;Key Takeaways for RTO and RPO&lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Recovery Time Objective&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Used to describe &lt;em&gt;maximum&lt;/em&gt; recovery time from point of incident&lt;/li&gt;
&lt;li&gt;Defined &lt;em&gt;before&lt;/em&gt; an incident occurs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Recovery Point Objective&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Used to describe &lt;em&gt;maximum&lt;/em&gt; amount of data lost&lt;/li&gt;
&lt;li&gt;Defined &lt;em&gt;after&lt;/em&gt; an incident occurs&lt;/li&gt;
&lt;li&gt;Dependent upon frequency of backups&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftg2c1z976lxmddeq64af.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftg2c1z976lxmddeq64af.png" alt="RTOvsRPO" width="800" height="265"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;u&gt;Importance of Having a Recovery Solution&lt;/u&gt;
&lt;/h2&gt;

&lt;p&gt;As a company, your data is absolutely vital to your operations and losing that data would be a huge problem. This is why having a plan of action and leveraging RTOs and RPOs will not only decrease the after-effects of any downtime but allow you to be more efficient in managing any disasters that may strike.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/mt/establishing-rpo-and-rto-targets-for-cloud-applications/" rel="noopener noreferrer"&gt;Click here to learn more!&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>devops</category>
    </item>
    <item>
      <title>Cloud Optimization: AWS Lambda vs. EC2</title>
      <dc:creator>Jake Neeper</dc:creator>
      <pubDate>Thu, 16 May 2024 21:33:22 +0000</pubDate>
      <link>https://dev.to/jakeinthecloud/cloud-optimization-aws-lambda-vs-ec2-2ki4</link>
      <guid>https://dev.to/jakeinthecloud/cloud-optimization-aws-lambda-vs-ec2-2ki4</guid>
      <description>&lt;p&gt;In the realm of cloud computing, efficiency and cost-effectiveness are key considerations for any business. People ask me all the time why I prefer architecture using Lambda over EC2 and here's why:&lt;/p&gt;

&lt;p&gt;1) &lt;strong&gt;Pay-per-Use Model&lt;/strong&gt;: One of the best advantages of Lambda is its &lt;em&gt;pay-per-use&lt;/em&gt; pricing model. Meaning, you only pay for the compute time consumed by your functions, measured in milliseconds(ms). Not being charged for idle resources makes it incredibly cost-effective, especially for sporadic or low-traffic workloads.&lt;/p&gt;

&lt;p&gt;2) &lt;strong&gt;No Server Management&lt;/strong&gt;: While EC2 instances require provisioning, monitoring, and maintenance, Lambda removes that workload off your plate by removing the underlying infrastructure. You upload your code, assign the triggers, and it will handle the rest by automatically scaling to accommodate traffic variation.&lt;/p&gt;

&lt;p&gt;3) &lt;strong&gt;Scalability&lt;/strong&gt;: Lambda offers organic scalability that handles any workload fluctuations. As requests increase, Lambda auto provisions the necessary resources to accommodate for the increase with no degradation in performance. Pretty awesome right?&lt;/p&gt;

&lt;p&gt;4) &lt;strong&gt;Microservices Architecture&lt;/strong&gt;: Lambda aligns seamlessly with microservices architecture. This allows developers to break down larger applications into smaller, more manageable components.&lt;/p&gt;

&lt;p&gt;5) &lt;strong&gt;Integration with AWS Ecosystem&lt;/strong&gt;: Lambda integrates with other AWS services, allowing the construction of sophisticated, serverless architectures. It doesn't matter if a function triggers from S3, DynamoDB, or API Gateway; Lambda streamlines interactions with AWS resources, boosting productivity as a result. Less work is a win in my book!&lt;/p&gt;

&lt;p&gt;While EC2 instances remain a necessary option for situations that require more control over the underlying infrastructure, AWS Lambda remains an excellent solution for many workloads, especially if there is any chance of traffic volatility.&lt;/p&gt;

&lt;p&gt;To sum it all up, with Lambda's serverless architecture, pay-per-use model, scalability, and organic integration with the AWS ecosystem, it becomes a very persuasive choice for anyone looking to reduce operational overhead and optimize costs in the cloud.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>architecture</category>
      <category>productivity</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
