Infrastructure as Config

The majority of the template based deployment frameworks advertise themselves as Infrastructure as Code, but fail to achieve the functionality and flexibility you would expect from actual code.

Read more

Protecting Your Backups

We have all heard the importance of making backups. You may have even heard of disaster recovery planning. Hopefully, you have listened to that advice and are well prepared. Now the question is, have you protected your backups from someone deleting them?

Read more

AZ500 - Identity - Part 2

The first major section in the Az500 exam is focused on managing identity and access. The goal of this post is to talk about apps and app registrations. It would be hard to dive in to a discussion on apps without talking about OATH 2.0, the underlying protocol that this feature supports.

Read more