From 5fff9a84a07a3d9a7bf961b7398db30244c5fe49 Mon Sep 17 00:00:00 2001 From: Alexandru Matcov <56674677+alexmatcov@users.noreply.github.com> Date: Fri, 5 Sep 2025 13:43:46 +0200 Subject: [PATCH 1/4] Create README.md create presentation proposal --- .../presentation/week3/matcov-thees/README.md | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 contributions/presentation/week3/matcov-thees/README.md diff --git a/contributions/presentation/week3/matcov-thees/README.md b/contributions/presentation/week3/matcov-thees/README.md new file mode 100644 index 0000000000..c14b9b0600 --- /dev/null +++ b/contributions/presentation/week3/matcov-thees/README.md @@ -0,0 +1,26 @@ +# Assignment Proposal + +## Title + +Multi-Cloud Deployments for Fault Tolerant Systems + +## Names and KTH ID + + - Alexandru Matcov (matcov@kth.se) + - Adrian Thees (thees@kth.se) + +## Deadline + +- Week 3 + +## Category + +- Presentation + +## Description + +First, we will explain what multi-cloud systems are and why one would want to use them. The focus will be on fault-tolerant systems. Then, we will discuss the challenges of deploying to a multi-cloud system and list some best practices, e.g., containerization and Kubernetes. Next, we will list and explain the pros and cons. Finally, we will present a tool, such as Spinnaker, to present how such a deployment could be managed in the real world. + +**Relevance** + +In recent years, major cloud outages have become common, whether due to malicious attacks or provider misconfigurations. For example, Cloudflare AWS incident (21. August 2025) and GCP IAM outage (12th June 2025) have experienced outages, resulting in many services hosted with these providers being inaccessible. To avoid this, many larger systems that require high uptime use multi-region/cloud infrastructure. However, deploying to different providers while maintaining the software and data can be quite challenging. From a2afdbbfb479fd9041ffc573c5c2ebee7b1ceee6 Mon Sep 17 00:00:00 2001 From: Alexandru Matcov <56674677+alexmatcov@users.noreply.github.com> Date: Wed, 17 Sep 2025 14:49:58 +0200 Subject: [PATCH 2/4] Create README.md --- .../matcov-schwartz/README.md | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 contributions/executable-tutorial/matcov-schwartz/README.md diff --git a/contributions/executable-tutorial/matcov-schwartz/README.md b/contributions/executable-tutorial/matcov-schwartz/README.md new file mode 100644 index 0000000000..7b931576ec --- /dev/null +++ b/contributions/executable-tutorial/matcov-schwartz/README.md @@ -0,0 +1,34 @@ +# Assignment Proposal + +## Title +DevSecOps with Checkov for Infrastructure Security Scanning + +## Names and KTH ID + - Alexandru Matcov (matcov@kth.se) + - Phoebe Schwartz (phoebes@kth.se) + +## Deadline +Task 3 + +## Category +Executable tutorial + +## Description +This executable tutorial demonstrates how to implement Infrastructure as Code (IaC) security scanning using Checkov, creating a DevSecOps workflow that prevents misconfigured infrastructure from reaching production. + +The tutorial will guide users through scanning and securing Terraform infrastructure code using Checkov, an open-source static analysis tool that identifies security misconfigurations and compliance violations. + +The tutorial will include: +* Setting up Terraform code with intentional security misconfigurations (i.e. public S3 buckets, overpermissive security groups, unencrypted resources) +* Installing and configuring Checkov for IaC security scanning +* Interpreting security scan results and understanding vulnerability classifications +* Implementing step-by-step remediation of critical security findings +* Demonstrating the complete scan-fail-fix-pass cycle + +Users will start with vulnerable AWS Terraform configurations, use Checkov to identify security issues, fix the vulnerabilities following security best practices, and finally show how to integrate automated security in CI/CD pipeline. + +The tutorial will be delivered through KillerCoda platform in 4 steps: introduction to IaC security, Checkov scanning basics, vulnerability remediation, and CI/CD integration. + +**Relevance** + +This tutorial addresses a critical aspect of modern DevOps: infrastructure security integration throughout the development lifecycle. With 95% of cloud security breaches being preventable through proper configuration management, implementing IaC security scanning has become essential for DevOps teams. The approach demonstrates core DevOps principles of automation, continuous integration, and shift-left practices by catching security issues early in the infrastructure provisioning process rather than after deployment. From c4055040cdf89cbae27c398aa968c040f12a1254 Mon Sep 17 00:00:00 2001 From: Alexandru Matcov <56674677+alexmatcov@users.noreply.github.com> Date: Wed, 17 Sep 2025 22:13:46 +0200 Subject: [PATCH 3/4] Rename README.md to README.md --- .../{matcov-schwartz => matcov-phoebes}/README.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename contributions/executable-tutorial/{matcov-schwartz => matcov-phoebes}/README.md (100%) diff --git a/contributions/executable-tutorial/matcov-schwartz/README.md b/contributions/executable-tutorial/matcov-phoebes/README.md similarity index 100% rename from contributions/executable-tutorial/matcov-schwartz/README.md rename to contributions/executable-tutorial/matcov-phoebes/README.md From 1b29a28b6e75fe73bcec3a0689867f9d8a0380ff Mon Sep 17 00:00:00 2001 From: Alexandru Matcov <56674677+alexmatcov@users.noreply.github.com> Date: Mon, 6 Oct 2025 14:46:45 +0200 Subject: [PATCH 4/4] Update README.md --- contributions/executable-tutorial/matcov-phoebes/README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/contributions/executable-tutorial/matcov-phoebes/README.md b/contributions/executable-tutorial/matcov-phoebes/README.md index 7b931576ec..1f085327ff 100644 --- a/contributions/executable-tutorial/matcov-phoebes/README.md +++ b/contributions/executable-tutorial/matcov-phoebes/README.md @@ -32,3 +32,7 @@ The tutorial will be delivered through KillerCoda platform in 4 steps: introduct **Relevance** This tutorial addresses a critical aspect of modern DevOps: infrastructure security integration throughout the development lifecycle. With 95% of cloud security breaches being preventable through proper configuration management, implementing IaC security scanning has become essential for DevOps teams. The approach demonstrates core DevOps principles of automation, continuous integration, and shift-left practices by catching security issues early in the infrastructure provisioning process rather than after deployment. + +**Deliverables** +* Tutorial: https://killercoda.com/alexmatcov/scenario/tutorial +* Repo: https://github.com/alexmatcov/infrastructure-security-tutorial