This blog documents real-world security architecture decisions, trade-offs, and lessons learned from designing hybrid environments, automating infrastructure, and operating modern security programs. The focus is not tools alone, but how systems fit together.
A deep dive into building a code-managed, Zero Trust homelab using Terraform, Ansible, and AWS Site-to-Site VPN.
Read Article →
Architecting a hardened GKE web application pipeline using Cloud Armor, Private Clusters, Workload Identity, and VPC Service Controls.
Read Article →
Designing a resilient, encrypted hybrid cloud architecture connecting on-premises Fortinet appliances to Google Cloud Platform using IPSec VPN and BGP.
Read Article →
A case study on auditing and hardening a Fortigate 60F infrastructure, resulting in a 40% reduction in firewall rules and implemented UTM profiles.
Read Article →
A step-by-step guide to deploying a high-availability Kubernetes 1.27 cluster on Hyper-V, using Fortigate for Load Balancing, Firewalling, and DHCP.
Read Article →