View Blog Post

Building Developer Sandboxes on AWS with Attribute-based access control (ABAC)

Identity Management had a curious beginning in the early 1500s in England, where parish churches kept elaborate written records “for the purpose of preventing bigamy and consanguineous marriage.” It was the invention of the automobile 400 years later that furthered the creation of personal identification when in 1903 two US states issued the first driver’s Read more…

View Blog Post

Hiring and Onboarding Employees in a Remote First World

Editor’s Note: Stelligent has been a remote-first company since 2013. All of our employees work from home, providing cloud consulting services to the public sector and corporations all over the United States. We love our remote culture, but the arrangement has its challenges. We’re publishing a series of articles to share our insights with everyone Read more…

View Blog Post

The Future of Work – Amazon Workspaces Webinar

Editor’s Note: Stelligent has been a remote-first company since 2013. All of our employees work from home, providing cloud consulting services to the public sector and corporations all over the United States. We love our remote culture, but the arrangement has its challenges. We’re publishing a series of articles to share our insights with everyone Read more…

View Blog Post

Reduce Cost and Increase Efficiency with DevOps

Do More with Less Today DevOps can mean different things to different people. At Stelligent we consider DevOps to be a collection of principles and practices for delivering software faster, more efficiently, and more securely. When implemented effectively, these principles and practices will make your team more efficient and effective, allowing you to do more Read more…

View Blog Post

Thought Experiment: Proposed Complexity Metric for IAM Policy Documents

Code Complexity Metrics When a professional software developer writes code, they measure the complexity of the code they write.  The contrapositive holds true as well that those who don’t measure the complexity of their code are not professional.  There are a variety of code complexity metrics available to the professional developer. The “better” metrics are Read more…

View Blog Post

Deployment Pipeline Compliance and Control – a Service-based Approach

Deployment Pipelines – Introduction The software “deployment pipeline” has become a common mechanism in the modern enterprise.  A deployment pipeline is a sequence of automation that produces or deploys a software artifact.  This artifact can take many forms, for example, a programming library, a web application, or even automation to converge infrastructure and security controls.  Read more…

View Blog Post

Three Ways: Event Driven Architecture

As the complexity and scale of our AWS use cases grow, so too does the complexity of  monitoring and managing our AWS accounts. Whether these concerns revolve around maintaining corporate compliance objectives, hardening accounts against attackers, or simply controlling cost, the enforcement mechanisms can involve some serious logic. With the advent of AWS Cloudwatch Events Read more…

View Blog Post

Automate Container Security Scans in Your CI/CD Pipeline with AWS ECS

Many enterprises attempt to drive software development and delivery towards a DevOps mindset. Likewise, organizations struggle with increasing security challenges while adopting these innovative software practices. Embedding security within the deployment lifecycle is non-negotiable. Therefore, integration of security into CI/CD workflows need be done cautiously to meet an ever-evolving technology landscape. DevSecOps is an important Read more…

View Blog Post

DevOps on AWS Radio: DevOps Culture with Jeff Gallimore (Episode 24)

In this episode, we chat with Excella Co-Founder and Partner Jeff Gallimore about all things DevOps culture. In this episode we take a departure from our technical deep dives to explore culture: how to measure culture, culture typology, psychological safety, how continuous delivery impacts culture, how culture affects performance, and more! We even get into Read more…

View Blog Post

Value Stream Mapping with Mock Pipeline

Value stream mapping (VSM) is a technique for modeling process workflows. In software development, one of the key reasons for creating a VSM is determining the bottlenecks slowing down the delivery of value to end users. While VSM is used in many different industries (mostly related to physical goods), the topic of this post is Read more…