Thursday, 24 September 2020
Thread Priority and Difference between Yield & Join
Monday, 14 September 2020
CircleCI Introduction
CircleCI
Question: What is Continuous Integration?
Continuous integration is a practice that encourages developers to integrate their code into the master branch of a shared repository. Instead of building out features in isolation and integrating them at the end of a development cycle, code is integrated with the shared repository by each developer multiple times throughout the day.
Why we need Continuous integration ?
CircleCI automates your software builds, tests, and deployments. We want to make
engineering teams more productive through intelligent automation. CircleCI provides
enterprise-class support and services. CircleCI runs nearly one million jobs per day in support
of 30,000 organisations.
Benefits of CircleCI
After a software repository on GitHub or Bitbucket is authorised and added as a project
to circleci.com, every code change triggers automated tests in a clean container or VM.
CircleCI runs each job in a separate container or VM, that Means each time your job runs
CircleCI spins up a container or VM to run the job in.
CircleCI then sends an email notification of success or failure after the tests complete. We
also have provision to include integrated Slack notifications. So that we will receive a
notification for build and deployment every time.
CircleCI may be configured to deploy code to various environments, for example: AWS
EC2 Container
Prerequisites for Running our first build
Basic terminal or bash knowledge using the command line is helpful.
Setting up CircleCI
https://circleci.com/docs/2.0/local-cli/
https://circleci.com/docs/2.0/getting-started/
Question: what a Pipeline is?
Pipelines represent the entire configuration that is run when you trigger work on your projects
that use CircleCI. The entirety of a .circleci/config.yml file is executed by a pipeline.
Prisma Cloud (Twistlock)
Prisma Cloud
Used by 25 percent of the Fortune 100, Prisma Cloud which was earlier known as Twistlock provides an automated and scalable container cybersecurity platform. Founded in 2015 by CEO Ben Bernstein.
Key Features
The Prisma Cloud Platform provides vulnerability management and compliance across the application lifecycle by scanning images and serverless functions to prevent security and compliance issues from progressing through the development pipeline, and continuously monitoring all registries and environments.
Additionally, Prisma Cloud provides defense in depth, with access control; automated, machine-learning driven runtime defense; and cloud native firewalls to protect modern applications from threats.
Ques : What Is Prisma Cloud(Twistlock)?
Prisma Cloud is a rule-based access control policy system for Docker and Kubernetes containers.
Prisma Cloud is able to be fully integrated within Docker and able to verify security policies.
Security policies can set the conditions for users to, say, create new containers but not delete them; or, they can launch containers but aren’t allowed to push code to them. Prisma Cloud features the same policy management rules as those on Kubernetes, wherein a user can modify management policies but cannot delete them.
Prisma Cloud also handles image scanning. Users can scan an entire container image, including any packaged Docker application or Node.js component. Prisma Cloud has done its due-diligence in this area, correlating with RedHat and Mirantis to ensure no container is left vulnerable while a scan is running.
Prisma Cloud also deals with image scanning of containers within the registries themselves.
Prisma Cloud has the proficiency to articulate a policy on a user-by-user basis, working with customers to customize container security solutions that work for their particular use cases.
Docker is Prisma Cloud’s current focus. In fact, Prisma Cloud was written in Go, primarily because of the focus the company has within the Go-driven Docker ecosystem.
Product Performance Metrics
Prisma Cloud is automatically deployed, and relies on behavioral learning to automatically create and enforce security profiles/models. Prisma Cloud has helped customers identify vulnerabilities in thousands of images, blocked thousands of builds of vulnerable images, enforced compliance with security standards for thousands of deployments, and identified compromised containers and hosts at hundreds of customers.
Delivery
Prisma Cloud runs entirely within customer environments with no required connectivity.
Install the Prisma Cloud (Twistlock) App and view the Dashboards
Vulnerability Information
Scan your Docker image and dependencies for vulnerabilities known to Prisma Cloud. Expose vulnerabilities to your developers and information on fixes in CI.
Set VULNERABILTY_THRESHOLD [ low, medium, high, critical ] in your source-code pipeline and prevent vulnerabilities from being introduced into your application. Keep your Docker image secure and fail your pipelines before you merge vulnerabilities into your protected branches.
Prisma Cloud is—in simple terms—a full stack security suite. It handles everything from A to Z, including automated forensics, securing your host, scanning for pods vulnerabilities, and providing additional layers of protection in the form of firewalls and compliance checks. The six tools that stand out among the many that Prisma Cloud now provides are:
Runtime Defense:
Setting Email alerts for Prisma Cloud
Go to left pane -> Manage-> Alerts->Click on Add Profile
Note: We could also configure Jira/slack integration with Prisma to get notification in slack in case of CVE found.
Setting Slack alerts for Prisma Cloud
Go to left pane -> Manage-> Alerts->Click on Add Profile
Cloud security management isn’t easy, but Prisma Cloud offers a set of tools that make the whole process more manageable. This is one of the reasons why users love this security suite so much.
Reference Guide:
https://cdn.twistlock.com/docs/downloads/Twistlock-Reference-Architecture.pdf
https://github.com/twistlock/docker