Author Archives: anuj - Page 17
Cloud Native Firewalls vs. Palo Alto Firewall
Often, in a hub spoke architecture, one needs to leverage BOTH - a custom appliance firewall, alongside a cloud native firewall ( Azure Firewall) Advantages of PA FW over Native…
Helpful gCloud Commands
At the Org Level - LIST all Enabled Org Policies gcloud beta resource-manager org-policies list --organization=blah blah > IAM Bindings at the org level gcloud organizations get-iam-policy org-id To get…
Adding Scopes for OAuth 2.0 Credentials
This content is password protected. To view it please enter your password below: Password:
Anthos and Multi Cluster Ingress
Multi Cluster Ingress is a Google-hosted service that helps customers build Anthos architecture through clusters deployed across multiple cloud regions. Resiliency Redirect traffic to the nearest cluster ( lowest latency…
NIST vs CIS Standards for GCP
Also read PCI DSS compliance on GCP and Google GOV Cloud NIST 800-53 seems to have far more controls than the base CIS standards for GCP. Using a tool such…
Cloud Control Metrics – CCM Compliance
Here is a good mapping of the CIS controls to CCM
Use Case Mix of Transactional and reporting data – slow running queries
Queries are running slowly. Must be able to speed it up - without moving data to a data warehouse or changing the existing schema Overview - Two methods of storing…
Block Public Access to Cloud Storage Buckets
This content is password protected. To view it please enter your password below: Password:
Extending on premises AD to AWS
This content is password protected. To view it please enter your password below: Password:
GCP Identity Aware Proxy in Azure?
GCP IAP - Identity aware proxy IAP is a combination of Identity (Access Management) and Networking Controls to provide granular access to applications. When you go into IAM, you should…