Book Image

Strategizing Continuous Delivery in the Cloud

By : Garima Bajpai, Thomas Schuetz
Book Image

Strategizing Continuous Delivery in the Cloud

By: Garima Bajpai, Thomas Schuetz

Overview of this book

Many organizations are embracing cloud technology to remain competitive, but implementing and adopting development processes while modernizing a cloud-based ecosystem can be challenging. Strategizing Continuous Delivery in Cloud helps you modernize continuous delivery and achieve infrastructure-application convergence in the cloud. You’ll learn the differences between cloud-based and traditional delivery approaches and develop a tailored strategy. You’ll discover how to secure your cloud delivery environment, ensure software security, run different test types, and test in the pre-production and production stages. You’ll also get to grips with the prerequisites for onboarding cloud-based continuous delivery for organizational and technical aspects. Then, you’ll explore key aspects of readiness to overcome core challenges in your cloud journey, including GitOps, progressive delivery controllers, feature flagging, differences between cloud-based and traditional tools, and implementing cloud chaos engineering. By the end of this book, you’ll be well-equipped to select the right cloud environment and technologies for CD and be able to explore techniques for implementing CD in the cloud.
Table of Contents (18 chapters)
1
Part 1: Foundation and Preparation for Continuous Delivery in the Cloud
6
Part 2: Implementing Continuous Delivery
11
Part 3: Best Practices and the Way Ahead

Supporting tools and technologies

In this section, we will take a look at the tools and technologies that might help us build a secure CI/CD infrastructure. We will take a look at the following tools and technologies:

  • Central authentication
  • Secrets management
  • Policy enforcement controllers
  • Auditing

Given the things we discussed previously, these tools and technologies might help us avoid some of the issues we discussed. However, they are not silver bullets and you should always make sure that you’re using them in the right way. Let’s take a look at the different tools and technologies.

Central authentication/identity management

In the example we used in Figure 8.1, we are dependent on lots of components, all of which might need all the necessary credentials. Think of a scenario where the password of one user is compromised and you have to change it, or a user leaves the company. Each of these cases causes lots of work and with a rising...