Security Controls in Infrastructure As Code

Total Page:16

File Type:pdf, Size:1020Kb

Security Controls in Infrastructure As Code FEATURE intend to shift some employees to ees-to-remote-work-permanently2. 4. ‘Mitigate risks with PKI’. DigiCert. remote work permanently’. Gartner, 3. Bissette, Hayleigh. ‘The threat Accessed Sep 2020. www.digicert. 3 Apr 2020. Accessed Sep 2020. of Covid-19 phishing attacks’. com/pki/. www.gartner.com/en/newsroom/ TheBusinessDesk, 7 Jul 2020. Accessed 5. ‘Behind the scenes of SSL cryptogra- press-releases/2020-04-03-gartner- Sep 2020. www.thebusinessdesk.com/ phy’. DigiCert. Accessed Sep 2020. cfo-surey-reveals-74-percent-of- yorkshire/news/2058462-the-threat-of- www.digicert.com/ssl-cryptography. organisations-to-shift-some-employ- covid-19-phishing-attacks. htm. Security controls in infrastructure as code Sadiq Almuairfi and Mamdouh Alenezi, Prince Sultan University Sadiq Almuairfi Mamdouh Alenezi The development, deployment and management of software applications have shifted dramatically in the past 10 years. This fundamental shift is what we now know as development operations (DevOps). Infrastructure as Code (IaC) is one for practitioners to study security smells of the main tenets of DevOps. Previously, manual configuration via cloud pro- in IaC scripts so that insecure coding viders’ UI consoles and physical hardware used to take place. But now, with the practices can be avoided. If we study the concept of IaC, the IT infrastructure can be automated by using blueprints that responses of the Common Weakness are easily readable by machines. Enumerator (CWE), it can be found that CWE considers hard-coded pass- To accomplish IaC, various programming Fowler introduced the concept of code words as a security weakness. According languages and tools must be used in order smell and according to them, code to CWE: “If hard-coded passwords are to define the infrastructure (network, serv- smells are flaws in code that may cause used, it is almost certain that malicious ers, storage). The ability to use practices problems.2 There might be no run-time users will gain access to the account in like code review, version control and unit errors while code smell is present but question.” Thus, even if a security smell testing impacts infrastructure automation the presence of code smell should be might not lead to a security breach at positively. Two of the biggest benefits that taken as an indication for improvement. the time of its discovery, proper atten- IaC implementation provides are com- Duplicate block (DB) smell is one such tion should be given to it and it should paratively rapid iterations and increased example of code smell that occurs when- be inspected whenever needed.4 speed of infrastructure deployment. The ever identical statements are repeated. usage of IaC scripts is really helpful for The results of various researches prove “Code smells are flaws practitioners in order to configure and that noting code smells is an appropriate in code that may cause provision their development environments. method of assessing the quality of pup- problems. There might be The scripts employed in IaC are also pet code. Puppet is a popular provision- no run-time errors while known as ‘Configuration as code scripts’ ing tool that helps write puppet codes code smell is present but or ‘configuration scripts.’ How beneficial and uses IaC in order to specify the the presence of code smell these IaC scripts are can be identified with desired state of the environment.3 should be taken as an the example of Fortune 500 company Since we know that IaC scripts are indication for improvement” Intercontinental Exchange (ICE). ICE uses used by practitioners to develop environ- IaC scripts to maintain 75% of its 20,000 ments and provision servers, there is a Writing the IaC code is quite a servers, which ultimately results in a time chance that they may introduce security complex task as it is basically done reduction of environment provisioning smells inadvertently. Security smells are by blending various infrastructure from one or two days to 21 minutes.1 simply recurring coding patterns or, in programming languages. Thus, some Although IaC has gained popularity in simpler terms, are basically measures that sort of approach is needed in order to recent years, when it comes to the qual- indicate security weakness. There is also create complex IaC designs that save ity of code, the research is very sparse. a possibility that the presence of secu- time not only when being designed This limited research has introduced the rity smells may lead to frequent security but also at the time of deployment and term ‘code smell’. Kent Beck and Martin breaches. Thus, it becomes necessary redeployment. Model-driven engineer- 13 October 2020 Computer Fraud & Security FEATURE ing (MDE) provides us with one such certain recurring coding patterns may ing these IaC scripts is also increased. approach – data-intensive continuous lead to weaknesses in security, indicating In order to exploit model-driven engi- engineering and rollout (Dicer) – that an increased chance of security breaches. neering (MDE), Artac et al attempted can be used to create language-agnostic In order to make sure that practitioners to create language-agnostic models that models that can be transformed into make no mistakes when developing IaC possess the capability to transform them- IaC. Dicer is a model-driven approach scripts, researchers conducted a study of selves into IaC scripts automatically. In and acts as a supporting tool for users security smells in IaC scripts. They made addition, the authors have shown that who wish to develop IaC for big data use of 1,726 IaC scripts through the a significant amount of time can be frameworks. Although Dicer doesn’t approach of qualitative analysis in order saved even while creating complex IaC support all of the well-known big data to find seven security smells. Among the by following the Dicer approach. Also, frameworks, it provides the benefit of 15,232 IaC scripts, the authors imple- the authors described the Ops activi- the addition of new frameworks.5 mented the SLIC (security linter for ties (server provisioning, monitoring, Similar to software source code, IaC infrastructure as code) tool to identify the self-adaptation, etc) required to deploy scripts can face many issues, making occurrence of each smell. Through their and operate cloud applications continu- these scripts susceptible to security research, Rahman et al in ‘The Seven ously. Speaking of Dicer, the key feature defects. Defects in IaC scripts can have Sins’ have tried to answer questions about it offers is that models that are written serious consequences, as these scripts are the type of security smells, their frequen- using the Dicer profile can be automati- associated with setting up and managing cy, lifetime and the opinion of practition- cally translated into IaC scripts. cloud-system infrastructure and ensur- ers about them. Apart from finding the The quality of code is important in ing the availability of software devices. answers to these questions, the authors any software project. Schwarz et al have For example, in early 2017, execution made sure that the results of the SLIC focused research on the quality of code of a defective IaC script removed the tool were properly evaluated and created while the concept of IaC is gaining home directories of around 270 cus- Oracle datasets in order to do that. popularity day by day, looking for flaws tomers in cloud instances maintained IaC uses blueprints that are easily read- in the quality of code – that is, code by Wikimedia.6 This evidence, plus able by machines. Schwarz et al have smells. In their research, the authors research studies, motivated us to care- discussed all the necessary elements and tried to apply code smells to different fully study the security of IaC, which is abstractions that are used in the writing technologies in order to investigate if the focus of this article. and maintenance of the blueprint of IaC. similar results could be achieved. To The authors seem to outline the benefits proceed with their research, the authors Related work of DevOps but at the same time keeping formulated two questions and by the IaC as the accelerating tactic for DevOps. application of code smells, tried to find Software teams are able to implement The standard that the authors have used the answers to those questions. The continuous deployment and make rapid for the expression is known as ‘topology questions were particularly concerned changes by the use of configuration as and orchestration specification for cloud with the applicability of puppet smells code (CaC) tools.7 The popularity of applications’ (Tosca). Tosca is defined as to other configuration management these tools is increasing day by day but an industrial practice language that is used tools and the existence of other pro- investigating the challenges faced by the for automated industrial deployment and gramming smells relevant to IaC. Also, programmers while using these tools and multi-cloud compliant applications. One the authors have proposed three types finding solutions to those challenges can other major benefit that Tosca offers is of code smells in the paper: technology be really helpful in identifying potential that it provides reusable nodes and edges. agnostic smells, technology-depend- technical challenges related to CaC. Also, the authors have discussed Dicer, ent smells and technology-specific We conducted research on what ques- which is a model-driven tool to quickly smells. The results obtained through tions are asked by the programmers about put together the infrastructure design for the research indicate the presence of CaC. In order to extract puppet-related a big data cloud application as a part of IaC smells in other technologies and questions asked by programmers on Stack continuous-data intensive architecting. tools. In order to be sure of the results Overflow from 2010 to 2016, qualita- obtained, the authors further evaluated tive analysis was applied.
Recommended publications
  • A Study of the Effectiveness of Cloud Infrastructure
    A STUDY OF THE EFFECTIVENESS OF CLOUD INFRASTRUCTURE CONFIGURATION A Thesis Presented to the Faculty of California State Polytechnic University, Pomona In Partial Fulfillment Of the Requirements for the Degree Master of Science In Computer Science By Bonnie Ngu 2020 SIGNATURE PAGE THESIS: A STUDY OF THE EFFECTIVENESS OF CLOUD INFRASTRUCTURE CONFIGURATION AUTHOR: Bonnie Ngu DATE SUBMITTED: Spring 2020 Department of Computer Science Dr. Gilbert S. Young _______________________________________ Thesis Committee Chair Computer Science Yu Sun, Ph.D _______________________________________ Computer Science Dominick A. Atanasio _______________________________________ Professor Computer Science ii ACKNOWLEDGEMENTS First and foremost, I would like to thank my parents for blessing me with the opportunity to choose my own path. I would also like to thank Dr. Young for all the encouragement throughout my years at Cal Poly Pomona. It was through his excitement and passion for teaching that I found my passion in computer science. Dr. Sun and Professor Atanasio for taking the time to understand my thesis and providing valuable input. Lastly, I would like to thank my other half for always seeing the positive side of things and finding the silver lining. It has been an incredible chapter in my life, and I could not have done it without all the love and moral support from everyone. iii ABSTRACT As cloud providers continuously strive to strengthen their cloud solutions, companies, big and small, are lured by this appealing prospect. Cloud providers aim to take away the trouble of the brick and mortar of physical equipment. Utilizing the cloud can help companies increase efficiency and improve cash flow.
    [Show full text]
  • Lessons Learned from a Large-Scale Infrastructure As Code Project
    PowerShell Conference Europe 2019 Hannover, Germany June 4-7, 2019 Lessons learned from a large-scale infrastructure as code project Platinum Sponsor Mark Warneke After this Session - I am able to develop a mature “Infrastructure As Code” project from scratch using a Test-Driven development approach, avoiding common pitfalls and getting a heads up in necessary considerations, tools and best practices - I can build sophisticated Azure Release Pipelines that leverage advanced testing scenarios using Azure Resource Manager Templates, PowerShell tooling to support an advanced “Infrastructure As Code” project @MarkWarneke Agenda Introduction Architecture Demo @MarkWarneke By viewing cloud computing as a starting point for IT automation, companies may be able to have it all: scalability, agility, flexibility, efficiency, “ and cost savings. But that’s only possible by building up both automation and cloud capabilities. – McKinsey @MarkWarneke“ What is the challange? Speed Control Agility @MarkWarneke Why change? Servers Services @MarkWarneke Paradigm shift Enforce/Control Enable/Support Controlled & central responsibility Freedom & delegated responsibility @MarkWarneke What organization want Secure, predictable, and flexible Control service delivery and operations capability (end to end traceability). Faster business innovation through Innovation adoption of cloud services. Business agility and reduced time-to- Speed/Agility market through efficient DevOps teams. Costs Efficient use of public cloud scale. @MarkWarneke DevOps benefits based on research Source: 2018 State of DevOps Report DORA @MarkWarneke A Cloud Center of Excellence (CCoE) is a cross- functional team of people responsible for developing and managing the cloud strategy, “governance, and best practices that the rest of the organization can leverage to transform the business using the cloud.
    [Show full text]
  • Adoption, Support, and Challenges of Infrastructure-As-Code: Insights from Industry
    Adoption, Support, and Challenges of Infrastructure-as-Code: Insights from Industry Michele Guerriero,1 Martin Garriga,2 Damian A. Tamburri,3 Fabio Palomba4 1Politecnico di Milano, Italy 2Jheronimus Academy of Data Science & Tilburg University, The Netherlands 3Jheronimus Academy of Data Science & Eindhoven University of Technology, The Netherlands 4University of Zurich, Switzerland [email protected], [email protected], [email protected], palomba@ifi.uzh.ch Abstract—Infrastructure-as-code (IaC) is the DevOps tactic semi-structured interviews in as many companies to distill: (1) of managing and provisioning infrastructure through machine- how practitioners currently develop infrastructural code — that readable definition files, rather than physical hardware config- is, the best/bad practices experienced by the practitioners as uration or interactive configuration tools. From a maintenance and evolution perspective, the topic has piqued the interest of IaC blueprints grow in size and maintenance costs [8], (2) practitioners and academics alike, given the relative scarcity of what is the automatic support available — that is, pros and supporting patterns, best practices, tools, and software engineer- cons of using existing tools in practice, and (3) the challenges ing techniques. Using the data coming from 44 semi-structured reported by the practitioners via direct experience — that is, interviews in as many companies, in this paper we shed light the research and industrial avenues that practitioners perceive on the state of the practice in the adoption of IaC and the key software engineering challenges in the field. Particularly, as worthy of investigation in the near future. we investigate (i) how practitioners adopt and develop IaC, (ii) Data on the above points reveals a number of results as well which support is currently available, i.e., the typically used as valuable avenues for further work.
    [Show full text]
  • INFRASTRUCTURE AS CODE–FINAL REPORT John Klein, Phd and Douglas Reynolds December 2018
    INFRASTRUCTURE AS CODE–FINAL REPORT John Klein, PhD and Douglas Reynolds December 2018 1 Introduction This report concludes work on Research Project 6-18 518 Feasibility of Infrastructure as Code, summarizing the problem addressed by the research, the research solution approach, and results. 1.1 Background 1.1.1 What Is Infrastructure as Code? Infrastructure as code (IaC) is a set of practices that use “code (rather than manual commands) for setting up (virtual) machines and networks, installing packages, and configuring the environment for the application of interest” [3]. The infrastructure managed by this code includes both physical equipment (“bare metal”) and virtual machines, containers, and software-defined networks. This code should be developed and managed using the same processes as any other software; for example, it should be designed, tested, and stored in a version-controlled repository. Although information technology (IT) system operators have long employed automation through ad hoc scripting of tasks, IaC technology and practices emerged with the introduction of cloud computing, and particularly infrastructure-as-a-service (IaaS) technology. In an IaaS-based envi- ronment, all computation, storage, and network resources are virtualized and must be allocated and configured using application programming interfaces (APIs). While cloud service providers furnish management consoles that layer an interactive application on top of the APIs, it is not practical to use a management console to create a system with more than a couple of nodes. For example, creating a new virtual machine (VM) using the Amazon Web Services management console requires stepping through at least five web forms and filling in 25 or more fields.
    [Show full text]
  • Adopting 'Infrastructure As Code' Misha Zynovyev (GSI)
    Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) adopting 'infrastructure as code' to run HEP applications Misha Zynovyev ([email protected]) Dennis Klein ([email protected]) Victor Penso ([email protected]) HEPiX Spring 2011 GSI, Darmstadt, 5th of May 2011 Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) acknowledgements Dr. Peter Malzacher Bastian Neuburger Christopher Huhn Dr. Stefan Haller Helge Brust Oliver Wirth Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) outline of the talk our mission statement current approaches to infrastructure management our approach to running HEP applications describing infrastructure with code our playgrounds results outlook Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) clarification target audience: developers, system administrators and infrastructure providers you accept the benefits of virtualization presented concepts are transparent to users1 this is not about how to build the Infrastructure-as-a-Service (IaaS) clouds, but about efficient ways to use them 1nevertheless users can have as much control of details as they can cope with Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) our mission statement we want to simplify deployment and operation of scientific computing applications and their infrastructure by describing everything in code furthermore, we need a mechanism which will allow us to use external resources provided by IaaS clouds in a transparent way Adopting 'Infrastructure as Code' Misha Zynovyev (GSI) deploying infrastructure manual (with OS tools, text-editor):
    [Show full text]
  • CV - Russell Dunphy [email protected] | 07849465404 |
    CV - Russell Dunphy [email protected] | 07849465404 | https://www.linkedin.com/in/rsslldnphy/ An experienced software developer, technical leader, and manager, with a love of functional ​ ​ ​ ​ ​ ​ ​ programming and coding as language. Came to programming by a somewhat unusual route: ​ ​ ​ a first class degree in Creative Writing. I see people, teams, code, and infrastructure as an interconnected ecosystem, and enjoy ​ ​ tending that ecosystem by sitting at the intersection of them all: doing people management, process optimisation, architecture, and coding as and when needed. I also enjoy developing long-term technical strategy, taking into account how this ecosystem fits into the wider business ​ ​ context, and finding sustainable, iterative ways to implement it. I’ve managed teams ranging in size from two to twelve, including developers, data scientists, scrum masters and testers. I’ve worked with a number of languages, most recently Clojure, ​ ​ Clojurescript, and Javascript/Typescript, and love learning more. I’m happy wrangling ​ ​ ​ ​ ​ infrastructure, doing backend work, or building frontend features. Most of all I like finding ways to make these different levels of the stack, and the people who work on them, form a cohesive whole. Employment Head of Engineering - HealthUnlocked Jun 2016 - Present ​ HealthUnlocked is social network for health, with around 3-4 million unique sessions per month. As Head of Engineering I am responsible for managing the tech team; for recruitment; for setting technical strategy for the organisation;
    [Show full text]
  • Devops: Introducing Infrastructure-‐As-‐Code
    DevOps: Introducing Infrastructure-as-Code Elisabetta Di Nitto, Damian A. Tamburri*, Michele Guerriero*, Matej Artac+, Tadej Borovsak+ *Politecnico di Milano +XLAB Corp. Roadmap o Session 1: DevOps In a Nutshell o Break! (5 mins) o Session 2: Infrastructure-as-code Explained through TOSCA o Session 3: Our proposal to connect Dev and Ops: the DICER tool Session 1 DevOps In a Nutshell Dev & Ops: the classical roles Dev focuses on o Developing features o Changing requirements o Releasing products Ops focuses on o Offering services o Providing guarantees and stability Dev vs. Ops “The system works correctly in the development machine but it does not on the operation machine” “10 days after successful deployment of last release, the system is overloaded” Who is guilty? Dev– team, or –Ops team? The problem: two disconnected groups • Dev works to apply releases • Ops resists to releases • Dev does not pay attention • Ops is aiming at to QoS guarantees guaranteering QoS • Changes are fundamental for the business! • QoS guarantees are needed too! DevOps • What is it: “Practices or tools that bridge the gap between development and operations” • Goal: Creates a collaborative mindset where a single team performs Dev and Ops àthe team must contain differentiated competences, background, etc. • Requires: • Culture management; • Automation tools; • Organisational as much as technical metrics • Continuous sharing artifacts, procedures, languages, approaches… DevOps Need 1: Process Alignment! - Unified Processes - Unified tooling Before DevOps Development
    [Show full text]
  • Infrastructure As Code (Iac) to Reduce Provisioning Time by 65%
    Infrastructure as Code (IaC) to Reduce Provisioning Time by 65% Credits Deepak Jayagopal Kanapathi Raja Sathya Narayanan Higher Elasticity And Scale of Infrastructure Has Made it Cumbersome to Manually Provision Even After The Adoption of Cloud Computing Legacy manual provisioning Cloud manual provisioning Evolution of of infrastructure infrastructure • Traditionally, Infrastructure provisioning has • Using cloud computing (Infrastructure as provisioning always been a manual process. a Service), an instant computing • Teams would rack and stack the servers and infrastructure could be provisioned and will manually configure them. managed over the internet. • Finally, they will install the application over • Cloud computing reduced the need for that hardware. high upfront capital expenditure as well • This used to be a slow process and there were as maintenance costs. a lot of accuracy and consistency issues. Infrastructure as Code (IaC) Infrastructure as Code IaC allows DevOps IaC takes cloud (IaC) is the process of engineers to view computing to its provisioning and complex maximum potential by managing the entire infrastructure in a automating the infrastructure through a codified way. manual, error-prone series of software. provisioning tasks. Cloud infrastructure solved many issues pertaining to the legacy provisioning methods. However, there are still issues persisting with manual provisioning of cloud infrastructure. Confidential & Restricted 2 Major Challenges with Manual Provisioning of Cloud Infrastructure DSPs across the globe have a Time consuming in Higher cost great necessity to adopt a provisioning infrastructure strong cloud strategy to deliver digital services across In the case of huge infrastructures, the time Cost is calculated per hour by taken to manual cloud provisioning gets cloud vendors.
    [Show full text]
  • Co-Evolution of Infrastructure and Source Code - an Empirical Study
    Co-evolution of Infrastructure and Source Code - An Empirical Study Yujuan Jiang, Bram Adams MCIS lab Polytechnique Montreal, Canada Email: yujuan.jiang,bram.adams @polymtl.ca { } Abstract—Infrastructure-as-code automates the process of have a high coupling with source code and test files, which configuring and setting up the environment (e.g., servers, VMs means that developers and testers need to perform a certain and databases) in which a software system will be tested and/or effort to maintain the build system files as the code and tests deployed, through textual specification files in a language like evolve. Based on these findings, we conjecture that IaC could Puppet or Chef. Since the environment is instantiated auto- run similar risks and generate similar maintenance overhead matically by the infrastructure languages’ tools, no manual as regular build scripts. intervention is necessary apart from maintaining the infrastruc- ture specification files. The amount of work involved with such In order to validate this conjecture, we perform an empir- maintenance, as well as the size and complexity of infrastructure ical case study on 265 OpenStack projects. OpenStack is an specification files, have not yet been studied empirically. Through ecosystem of projects implementing a cloud platform, which an empirical study of the version control system of 265 OpenStack requires substantial IaC to support deployment and tests on projects, we find that infrastructure files are large and churn frequently, which could indicate a potential of introducing bugs. virtual machines. The study replicates the analysis of McIntosh Furthermore, we found that the infrastructure code files are et al.
    [Show full text]
  • Infrastructure As Code Handbook
    THE INFRASTRUCTURE AS CODE HANDBOOK Best practices, tools, and AWS CloudFormation scripts you can use to implement IaC for your organization www.thorntech.com Copyright © 2018 | THORN TECHNOLOGIES All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the publisher. THE INFRASTRUCTURE AS CODE HANDBOOK Contents 1 FIVE REASONS WHY YOU SHOULD IMPLEMENT INFRASTRUCTURE AS CODE NOW 2 SIX BEST PRACTICES TO GET THE MOST OUT OF IAC 3 FIFTEEN IAC TOOLS YOU CAN USE TO AUTOMATE YOUR DEPLOYMENTS 4 WHAT IS AWS CLOUDFORMATION AND HOW CAN IT HELP YOUR IAC EFFORTS? 5 HOW AWS CLOUDFORMATION WORKS AND HOW TO CREATE A VIRTUAL PRIVATE CLOUD WITH IT 6 HOW TO INCORPORATE S3, EC2, AND IAM IN A CLOUDFORMATION TEMPLATE 7 HOW TO CREATE A REDSHIFT STACK WITH AWS CLOUDFORMATION 3 www.thorntech.com [email protected] THE INFRASTRUCTURE AS CODE HANDBOOK 5 reasons why you should implement infrastructure as code now INFRASTRUCTURE AS CODE CAN HELP AVOID CLOUD DEPLOYMENT INCONSISTENCIES, INCREASE DEVELOPER PRODUCTIVITY, AND LOWER COSTS There’s no doubt that cloud computing has had a major impact on how companies build, scale, and maintain technology products. The ability to click a few buttons to provision servers, databases, and other infrastructure has led to an increase in developer productivity we’ve never seen before. While it’s easy to spin up simple cloud architectures, mistakes can easily be made provisioning complex ones. Human error will always be present, especially when you can launch cloud infrastructure by clicking buttons on a web app.
    [Show full text]
  • Microsoft Azure: Infrastructure As Code
    Microsoft Azure: Infrastructure as Code WorkshopPLUS Duration: 3 Days Focus Area: Change and Configuration Management Difficulty: 300 - Advanced Overview Key Takeaways Get hands-on with Infrastructure as Code by learning how Course Material to author and submit code from common tools into Azure • Azure Templates Resource Manager (ARM). In this course you can choose learning paths for integrating with Microsoft 1st party and • Visual Studio Code 3rd party open source including: Azure Templates, Hands-on Labs Terraform, Ansible, Azure Automation, and Desired State • Most of the concepts covered above will be supported Configuration. You’ll walk away understanding basic and by hands-on labs and demos advanced techniques for programmatically instructing Azure how to build-out and update your environments. • Utilize tools that integrate with Azure Objectives Agenda After completing this training, students will be able to: Day 1 • Understand what infrastructure as code means • Introduction to Infrastructure as Code • Learn about the different tools available to manage • Tools code lifecycle • Overview of Azure • How to manipulate & reference code Day 2 • Optional Module(s) • Understand the structure of an Azure Template Day 3 • Set resource deployment order • Optional Module(s) • Onboard Azure Automation & DSC • Q&A, as time permits • Learn to leverage & integrate third-party, open source software to develop the Azure environment Plan for 3 full days. Early departure on any day is not • Describe Ansible fundamentals, dynamic inventory and recommended. deploy Azure resources • Learn Terraform best practices for deploying Azure resources • Integrate Terraform with continuous integration / continuous delivery 2019 © Microsoft Corporation. All rights reserved. This data sheet is for informational purposes only.
    [Show full text]
  • HASHICORP TERRAFORM and RED HAT ANSIBLE AUTOMATION Infrastructure As Code Automation
    HASHICORP TERRAFORM AND RED HAT ANSIBLE AUTOMATION Infrastructure as code automation OVERVIEW INTRODUCTION As organizations modernize their application delivery process and adopt new tools to make them more efficient, infrastructure as code (IaC) has become a critical practice. IaC is an umbrella term, usually referring to a broad range of tools, operational frameworks, and a rich ecosystem. In this piece, we describe what is meant by infrastructure as code and how HashiCorp Terraform and Red Hat® Ansible® Automation can be used as a foundation for an IaC initiative. WHAT IS INFRASTRUCTURE AS CODE? In the last four decades, most approaches to infrastructure management have relied on graphical and command-line user interfaces that human operators have used to initialize or modify system configurations. These approaches are prone to human error. The process carried out by an operator might be documented by a checklist or a memorized routine without enforced oversight or iterative versioning. In contrast, the IaC approach promotes formalized, standardized, and automated operational processes — and dictates that these operational processes are documented as configuration files or programming code. By treating infrastructure as code, IT organizations can automate management tasks while using the best practices of software development, including code review and version control. This approach mitigates management complexity by breaking down a task into smaller, more manageable processes, controlling the execution of code, and effortlessly maintaining up-to-date documentation. The IaC approach also reduces operational risks by allowing multiple subject matter experts to peer review the code and by saving all the previous revisions of a codified infrastructure, enabling previous versions to be restored in case of mistakes.
    [Show full text]