securityboulevard.com
Open in
urlscan Pro
2606:4700:10::6816:29c
Public Scan
Submitted URL: https://go.aryaka.com/NDc3LVdOTC04MzYAAAGMD5Q5R8HtWl5z2RV3wyj2xsFV66bj_M85Vdk57NqlESMKJrnVpIg40XE7ORP7RAGucoZgyFw=
Effective URL: https://securityboulevard.com/2023/05/role-of-dns-level-security-for-sase/?mkt_tok=NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7...
Submission: On May 31 via api from NL — Scanned from NL
Effective URL: https://securityboulevard.com/2023/05/role-of-dns-level-security-for-sase/?mkt_tok=NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7...
Submission: On May 31 via api from NL — Scanned from NL
Form analysis
2 forms found in the DOMGET https://securityboulevard.com/
<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
<div class="search-wrap">
<input type="text" placeholder="Search" class="s field" name="s">
<button class="search-icon" type="submit"></button>
</div>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e
<form id="hsForm_4b9a2bbd-665c-447b-81df-233280dc689e" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e"
class="hs-form-private hsForm_4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e_d58a8f90-5e9c-4fba-9af8-748abec93886 hs-form stacked"
target="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" data-instance-id="d58a8f90-5e9c-4fba-9af8-748abec93886" data-form-id="4b9a2bbd-665c-447b-81df-233280dc689e" data-portal-id="1628905">
<div>
<div class="hs-richtext hs-main-font-element">
<p style="color: #fff;">Get breaking news, free eBooks and upcoming events delivered to your inbox.</p>
</div>
</div>
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4b9a2bbd-665c-447b-81df-233280dc689e" class="" placeholder="Enter your " for="email-4b9a2bbd-665c-447b-81df-233280dc689e"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-4b9a2bbd-665c-447b-81df-233280dc689e" name="email" required="" placeholder="Enter your email address*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div>
<div class="hs-richtext hs-main-font-element">
<div style="text-align: center;"><a href="https://securityboulevard.com/privacy-policy/" style="color: #fff; font-size: 12px;">View Security Boulevard <u>Privacy Policy</u></a></div>
</div>
</div>
<div>
<div class="hs-richtext hs-main-font-element">
<hr style="border: 1px solid #ccc; width: 100%; margin: 20px auto;">
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe Now"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1685528849007","formDefinitionUpdatedAt":"1661184187789","clonedFromForm":"d967bc1f-2d57-4dcf-861d-5930d7bea674","renderRawHtml":"true","isLegacyThemeAllowed":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.90 Safari/537.36","pageTitle":"Role of DNS-level security for SASE - Security Boulevard","pageUrl":"https://securityboulevard.com/2023/05/role-of-dns-level-security-for-sase/?mkt_tok=NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7FZSF1Rzm9G1K2RMMiXGliex_ucMuevQ-lUynGN1b-_eLz51_1vlR7_FwgpgeWIRlWdOzO6wsD2txJQjVRGRU5iQ","referrer":"https://go.aryaka.com/","urlParams":{"mkt_tok":"NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7FZSF1Rzm9G1K2RMMiXGliex_ucMuevQ-lUynGN1b-_eLz51_1vlR7_FwgpgeWIRlWdOzO6wsD2txJQjVRGRU5iQ"},"isHubSpotCmsGeneratedPage":false,"contentType":"blog-post","hutk":"520025280e526e9831edb6056b20a908","__hsfp":1987118913,"__hssc":"90482629.1.1685528849432","__hstc":"90482629.520025280e526e9831edb6056b20a908.1685528849431.1685528849431.1685528849431.1","formTarget":"#hbspt-form-d58a8f90-5e9c-4fba-9af8-748abec93886","locale":"en","timestamp":1685528849453,"originalEmbedContext":{"portalId":"1628905","formId":"4b9a2bbd-665c-447b-81df-233280dc689e","region":"na1","target":"#hbspt-form-d58a8f90-5e9c-4fba-9af8-748abec93886","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"d58a8f90-5e9c-4fba-9af8-748abec93886","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3243","sourceName":"forms-embed","sourceVersion":"1.3243","sourceVersionMajor":"1","sourceVersionMinor":"3243","_debug_allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1685528849124,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Role of DNS-level security for SASE - Security Boulevard\",\"pageUrl\":\"https://securityboulevard.com/2023/05/role-of-dns-level-security-for-sase/?mkt_tok=NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7FZSF1Rzm9G1K2RMMiXGliex_ucMuevQ-lUynGN1b-_eLz51_1vlR7_FwgpgeWIRlWdOzO6wsD2txJQjVRGRU5iQ\",\"referrer\":\"https://go.aryaka.com/\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.90 Safari/537.36\",\"urlParams\":{\"mkt_tok\":\"NDc3LVdOTC04MzYAAAGMD5Q5R__2LxWot7-IaLnlhb7FZSF1Rzm9G1K2RMMiXGliex_ucMuevQ-lUynGN1b-_eLz51_1vlR7_FwgpgeWIRlWdOzO6wsD2txJQjVRGRU5iQ\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1685528849126,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"NL\""},{"clientTimestamp":1685528849447,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"520025280e526e9831edb6056b20a908\",\"contentType\":\"blog-post\"}"}]}"><iframe
name="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" style="display: none;"></iframe>
</form>
Text Content
Wednesday, May 31, 2023 * * * * * * * SECURITY BOULEVARD The Home of the Security Bloggers Network Community Chats Webinars Library * Home * Cybersecurity News * Features * Industry Spotlight * News Releases * Security Bloggers Network * Latest Posts * Contributors * Syndicate Your Blog * Write for Security Boulevard * Webinars * Upcoming Webinars * Calendar View * On-Demand Webinars * Events * Upcoming Events * On-Demand Events * Chat * Security Boulevard Chat * Marketing InSecurity Podcast * Techstrong.tv Podcast * TechstrongTV - Twitch * Library * Related Sites * Techstrong Group * Cloud Native Now * DevOps.com * Security Boulevard * Techstrong Research * Techstrong TV * Techstrong.tv Podcast * Techstrong.tv - Twitch * Devops Chat * DevOps Dozen * DevOps TV * Media Kit * About Us * Sponsor * Analytics * AppSec * CISO * Cloud * DevOps * GRC * Identity * Incident Response * IoT / ICS * Threats / Breaches * More * Blockchain / Digital Currencies * Careers * Cyberlaw * Mobile * Social Engineering * Humor Hot Topics * Discord Admins Hacked by Malicious Bookmarks * SEO Poisoning: How Threat Actors Are Using Search Engines to Compromise Organizations * Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims * BSidesSF 2023 - Mike Kiser - New Face, Who Dis? Recent Adversarial Approaches to Facial Recognition * Apptega Launches GLBA Framework to Coincide with Impending Updates * Discord Admins Hacked by Malicious Bookmarks * SEO Poisoning: How Threat Actors Are Using Search Engines to Compromise Organizations * Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims * BSidesSF 2023 - Mike Kiser - New Face, Who Dis? Recent Adversarial Approaches to Facial Recognition * Apptega Launches GLBA Framework to Coincide with Impending Updates TwitterLinkedInFacebookRedditEmailShare Security Bloggers Network Home » Security Bloggers Network » Role of DNS-level security for SASE ROLE OF DNS-LEVEL SECURITY FOR SASE by Srini Addepalli on May 9, 2023 Many articles in the industry and my blog on Deciphering SASE are very clear on the major constituents of SASE. In the case of SASE Security, the predominant components discussed are Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), and Next-Generation Firewall (NGFW). Security functions across these components are IP address, domain, URL, file reputation-based access control, anti-malware, Data Loss Prevention, intrusion prevention, in addition to policy-based access controls at various levels, including L3/L4 access controls, URL category-based access controls, Software as a Service function level access controls, etc. Sponsorships Available Since Hypertext Transfer Protocol (HTTP) is the most common protocol for Internet, Software as a Service, and even Enterprises applications access, security functions are described in the context of Hypertext Transfer Protocol by many articles. In this article, the focus is on the Domain Name System (DNS) protocol and threat protection that can be achieved via DNS proxies. We at Aryaka believe that SASE shall include DNS-based security. What is DNS? DNS is a system that translates human-readable domain names to IP addresses. Computers communicate with each other using IP addresses, but domain names are easier for humans to remember and use. When a user types in a domain name in their browser to access a website or service, the browser sends a DNS query request to a DNS resolver to look up the IP address associated with the domain name. The resolver looks up the IP address in a distributed database called the DNS hierarchy and returns it to the browser, which then uses the IP address to establish a connection to the server hosting the website or service. Security via DNS and DNS Security The term “DNS Security” is typically used to refer to measures taken to protect the enterprise DNS infrastructure, including authoritative DNS servers and DNS resolvers. “Security via DNS” refers to using the DNS protocol for threat protection and access control, typically via transparent DNS proxies. Since SASE is consolidating multiple network security services into one, we believe that SASE needs to include both “Security via DNS” and “DNS Security” functionalities. Both these functionalities can be realized by SASE via the DNS proxy mechanism. The SD-WAN portion of SASE can intercept the DNS traffic and hand it over to a DNS proxy to perform various security functions. A DNS proxy also needs to act as a simple (non-recursive) DNS resolver to send the DNS queries to upstream DNS resolvers/servers. Common features of SASE DNS Proxy Ensuring Privacy: DNS queries generated by clients such as native client applications/browsers are not encrypted. Due to this, any intermediate entity that has access to the traffic can see what websites are being visited by the users. This lack of privacy can make it easier for man-in-the-middle attackers to track users’ online behavior. Since DNS proxy in SASE can come in the picture before the DNS queries go out of Enterprises’ logical boundary, it can protect the privacy of users’ online behavior via DNS-over-TLS and DNS-over-HTTP with upstream DNS resolvers. The DNS proxy intercepts DNS queries from clients and can forward them over DNS-over-HTTPS/TLS to upstream DNS resolvers. Ensuring integrity and authentication of DNS responses: DNS system is built around trust. DNS clients and DNS resolvers trust the DNS response they get from upstream DNS servers and resolvers. If the upstream DNS systems are compromised, it is possible for the attackers to send DNS responses with their attackers’ site IP addresses for the genuine domain names. This is called DNS spoofing or DNS cache poisoning attacks. DNSSEC (Secure DNS) enhancements on DNS protocol is one of the solutions to stop DNS spoofing. DNSSEC protects against attacks by digitally signing DNS response data to help DNS clients/resolves to validate the authenticity of the data, thereby protecting from manipulated/forged DNS data. However, all DNS clients and resolvers are not capable of performing DNSSEC. DNS proxies that come in the way of DNS clients and upstream DNS servers can verify the validating of the data using DNSSEC functionality. Protection from DNS flood attacks: I found this article to be very comprehensive in describing DDoS attacks on DNS infrastructure, specifically DNS amplification & DNS reflection attacks, which can overwhelm the victim. This includes both the infrastructure on which DNS servers/resolvers are running as well as the DNS service itself. Another type of attack aims to exhaust the resources (CPU and memory). Examples of this type include NXDOMAIN flood attacks and water-torture attacks where the attacker sends the DNS queries with non-existent domains and sub-domains with random labels. SASE with its L3/L4 firewall service, can prevent DNS responses from reaching the victim if there was no DNS query for them, effectively stopping the reflection attacks. Additionally, SASE with its generic rate-limiting service, can be used to restrict the number of queries per source IP/subnet, thereby mitigating the flood of DNS services (resolvers and servers). A SASE DNS proxy is necessary for intelligent protection against flood attacks, including NXDOMAIN floods and water-torture attacks. The SASE DNS proxy mitigates these attacks through DNS protocol-level rate limiting and the detection of random labels using abnormal domain name detection methods. Protection from DNS based Exploits: Vulnerabilities and misconfiguration of the DNS infrastructure can be exploited by attackers to compromise DNS services. Once a DNS service is compromised, attackers can spoof the DNS responses with their own IP addresses. Some examples of buffer overflow vulnerabilities include Bind9 TKEY vulnerability and inverse query overflow vulnerability. Some exploits can be detected by checking the compliance with the relevant RFCs. However, in some cases, the exploit payload adheres to RFCs, while taking advantage of vulnerabilities in the implementation of DNS services. SASE security typically includes IDPS (Intrusion Detection and Protection System) that can be used to detect known exploits. For zero-day protection, it is important that SASE DNS proxy checks for protocol compliance and employ anomaly detection to identify abnormal DNS payload content compared to what is typically observed. Access Control and Prevent Users from Visiting Sites with a Bad Reputation: As described in the “What is DNS” section above, the domain name query is the first step when a user visits any website. Via-DNS security can play a significant role in preventing users from accessing sites that host malware and phishing content. Many threat intelligence vendors provide reputation scores for IP addresses and domain names. This intelligence can be utilized to block DNS queries to malicious domain names and prevent DNS responses that include bad IP addresses. The functionality of a SASE DNS proxy enables the implementation of this first-level anti-malware and anti-phishing security for users. SASE DNS proxies integrate with multiple threat intelligence vendors to regularly obtain the IP/Domain reputation database and filter DNS queries and responses that involve malicious IP addresses and domain names. However, it is important to note that there can be false positives in the threat intelligence feeds, so it is crucial to ensure that your SASE provider offers the capability to create exceptions. Additionally, a SASE DNS proxy allows administrators to filter custom domain names and IP addresses, which can help prevent users from accessing sites that are not aligned with the enterprise’s interests. Protection from Compromised Upstream DNS Services: As mentioned earlier, DNSSEC can address the issue of DNS response validity and prevent DNS responses with spoofed IP addresses. However, not all DNS services implement DNSSEC. Detecting DNS spoofing from non-DNSSEC-based compromised DNS services is crucial to prevent users from accessing phishing and malware sites. One technique is to utilize multiple upstream DNS resolvers, compare the responses from each resolver, and only forward the DNS response if the results are consistent. The functionality of a SASE DNS proxy allows for the cross-verification of multiple DNS responses received from various upstream DNS resolvers. It checks for consistency among the responses and only responds when successful verification is achieved. Since this approach may introduce additional latency to DNS queries due to the need to wait for responses from multiple upstream DNS resolvers, it is common practice to send multiple DNS queries and perform cross-verification only when the threat intelligence database does not have an answer for the queried domain names. Indicators of Compromise (IoC): Security analysis of DNS traffic can provide valuable insights and indicators of compromise. Some of the insights and IoCs that SASE DNS security can provide include: * Suspicious domain names using threat intelligence feeds. * Detection of DNS spoofing attempts through DNS response analysis, as described in the section “Protection from compromised upstream DNS services” and other techniques. * Identification of abnormal and unexpected DNS response codes, such as NXDOMAIN and SERVFAIL. * Detection of unusual query patterns, such as a high volume of requests to a particular domain or repeated failed queries. * Detection of Domain Generation Algorithms (DGAs) typically used by malware to communicate with command-and-control centers. * Identification of fast flux networks, where IP addresses associated with a domain rapidly change. This behavior is commonly observed in sites hosting malware. SASE DNS Proxy, IDPS, and firewalls play a significant role not only in mitigating risks for users but also in providing valuable insights through the logs generated by the SASE system. Summary In our view, DNS-based security serves as the first line of defense for both users and DNS infrastructure, as DNS is consulted before actual data transactions occur. Detecting attacks as early as possible is crucial for effective security. While DNS-based security may not be prominently featured in much of the current SASE/SSE literature, we firmly believe that SASE/SSE services should incorporate DNS-based security. Check out previous blog posts on SASE and security topics here. The post Role of DNS-level security for SASE appeared first on Aryaka. *** This is a Security Bloggers Network syndicated blog from Srini Addepalli, Author at Aryaka authored by Srini Addepalli. Read the original post at: https://www.aryaka.com/blog/role-of-dns-level-security-for-sase/ May 9, 2023May 9, 2023 Srini Addepalli 0 Comments Blog * ← Tips for Gamifying Your Cybersecurity Awareness Training Program * Online Fraud is Costing Your Business More Than You Think: Insights from RSA 2023 → TECHSTRONG TV – LIVE Click full-screen to enable volume control Watch latest episodes and shows UPCOMING WEBINARS Wed 31 SIMPLIFY, SECURE, STRENGTHEN: IMPLEMENTING ZERO-TRUST ACROSS YOUR ENDPOINTS May 17 @ 1:00 pm - July 12 @ 2:00 pm Jun 05 SECURING OPEN SOURCE June 5 @ 1:00 pm - 2:00 pm Jun 08 ACTIVESTATE WORKSHOP: BUILDING SECURE AND REPRODUCIBLE OPEN SOURCE RUNTIMES June 8 @ 1:00 pm - 2:00 pm Jun 13 UNCOVERING THE HIDDEN CYBERSECURITY THREAT IN YOUR ORGANIZATION June 13 @ 1:00 pm - 2:00 pm Jun 14 ENRICH SECURITY INVESTIGATIONS WITH SERVICENOW ASSET DATA IN SNOWFLAKE June 14 @ 3:00 pm - July 24 @ 4:00 pm Jun 15 SECURING CONTAINERS & KUBERNETES WITH AWS AND CALICO June 15 @ 3:00 pm - 4:30 pm Jun 22 STRANGE BEDFELLOWS: SOFTWARE, SECURITY AND THE LAW June 22 @ 11:00 am - 12:00 pm Jun 22 SNEAK PEEK: CLOUD SECURITY PRIORITIZED WITH SONRAI June 22 @ 1:00 pm - 2:00 pm Jun 22 UNLEASH THE POTENTIAL OF YOUR LOG AND EVENT DATA, INCLUDING AI’S GROWING IMPACT June 22 @ 3:00 pm - 4:00 pm Jul 24 IDENTITY AND ACCESS MANAGEMENT July 24 @ 1:00 pm - 2:00 pm More Webinars SUBSCRIBE TO OUR NEWSLETTERS Get breaking news, free eBooks and upcoming events delivered to your inbox. View Security Boulevard Privacy Policy -------------------------------------------------------------------------------- MOST READ ON THE BOULEVARD COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT Revolutionize Zero-Trust Security With a Converged Identity Platform Federal Appellate Court Approves ‘Pretext’ Border Search Consumers Wary of Biometric Security Understanding the Progression of a Ransomware Attack Is Your SIEM Strategy Failing You? Here’s Why AI-Powered XDR Might Be The Answer What are FedRAMP Requirements? (And Who Needs to Know) Phishing Domains Tanked After Meta Sued Freenom Utilizing SEC Cybersecurity Rule and CISA Directive | anecdotes BSidesSF 2023 – Leif Dreizler – Tracking Meaningful Security Product Metrics DOWNLOAD FREE EBOOK INDUSTRY SPOTLIGHT Analytics & Intelligence API Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities ‘PREDATOR’ — NASTY ANDROID SPYWARE REVEALED May 30, 2023 Richi Jennings | Yesterday 0 Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight DELL LAUNCHES PROJECT FORT ZERO SERVICE TO ACCELERATE ZERO-TRUST IT SHIFT May 23, 2023 Michael Vizard | May 23 0 Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threats & Breaches FACEBOOK FINED $1.3B — ZUCKERBERG FURIOUS IN GDPR FIGHT May 22, 2023 Richi Jennings | May 22 0 Comments TOP STORIES Analytics & Intelligence API Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities COSMICENERGY: ‘RUSSIAN’ THREAT TO POWER GRIDS ICS/OT May 26, 2023 Richi Jennings | 4 days ago 0 Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) FEDERAL APPELLATE COURT APPROVES ‘PRETEXT’ BORDER SEARCH May 26, 2023 Mark Rasch | 4 days ago 0 Comments Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight Threat Intelligence U.S.-SOUTH KOREA FORGE STRATEGIC CYBERSECURITY FRAMEWORK May 25, 2023 Christopher Burgess | May 25 0 Comments SECURITY HUMOR RANDALL MUNROE’S XKCD ‘THE SIX PLATONIC SOLIDS’ JOIN THE COMMUNITY * Add your blog to Security Bloggers Network * Write for Security Boulevard * Bloggers Meetup and Awards * Ask a Question * Email: info@securityboulevard.com USEFUL LINKS * About * Media Kit * Sponsor Info * Copyright * TOS * DMCA Compliance Statement * Privacy Policy RELATED SITES * Techstrong Group * Cloud Native Now * DevOps.com * Digital CxO * Techstrong Research * Techstrong TV * Techstrong.tv Podcast * DevOps Chat * DevOps Dozen * DevOps TV * * * * * * * Copyright © 2023 Techstrong Group Inc. All rights reserved. ✓ Thanks for sharing! AddToAny More… previousnextslideshow We'd like to show you notifications for the latest news and updates. AllowCancel