top of page

AzureDevSecOps -Digital Lending

  • Writer: Anand Nerurkar
    Anand Nerurkar
  • 3 days ago
  • 2 min read
  • “We shift-left with Veracode SAST & SCA in the build; block on policy.

  • We secure containers before pushing to ACR.

  • We deploy to AKS-Test and run Veracode DAST on the live endpoints, plus IAST for deep runtime findings.

  • Pre-prod adds canary and full DAST, then promote to active-active AKS prod behind Front Door → App Gateway → APIM.

  • Azure Policy/Blueprints enforce private endpoints and zero-trust.

  • All results feed back into work items with MTTR and risk score dashboards.”


┌─────────────────────────────────────────────────────────────────────────────┐

│ DIGITAL LENDING – DEVSECOPS (AZURE) │

│ Microservices: KYC | CreditScore | LoanEval | Disbursement │

└─────────────────────────────────────────────────────────────────────────────┘


Developers

│ (Git push)

┌────────────────────────┐ Pre-commit/PR checks

│ Source Repos (Git) │─── Secret Scan (git-secrets/trufflehog)

│ (Azure Repos/GitHub) │ Lint + Unit Tests (fast)

└────────────────────────┘ SonarQube Quality Gate

▼ CI trigger

┌─────────────────────────────────────────────────────────────────────────────┐

│ CI / BUILD STAGE │

├─────────────────────────────────────────────────────────────────────────────┤

│ Compile + Unit Tests + Coverage │

│ Veracode SAST ──► static code analysis (block on High/Critical) │

│ Veracode SCA ──► third-party/CVE scan (policy gate) │

│ SBOM Generate ──► CycloneDX (artifact attach) │

└─────────────────────────────────────────────────────────────────────────────┘

│ (Policy Gate: fail on violations)

┌─────────────────────────────────────────────────────────────────────────────┐

│ CONTAINERIZATION STAGE │

├─────────────────────────────────────────────────────────────────────────────┤

│ Docker Build (each svc) → Tag │

│ Container Scan (Trivy/Veracode Container Security) → block on Critical │

│ Push signed images → Azure Container Registry (ACR) (ADO task + cosign) │

└─────────────────────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────────────────────┐

│ DEPLOY TO TEST (AKS-TEST) │

├─────────────────────────────────────────────────────────────────────────────┤

│ Helm/Kustomize deploy → AKS (private subnet) │

│ Istio/Linkerd (mTLS) + Pod Security │

│ OPA/Gatekeeper (admission policy) │

│ Secrets via Key Vault + Workload Identity │

└─────────────────────────────────────────────────────────────────────────────┘

├──────────────► Runtime Tests: Smoke + Integration + Contract (PACT)

├──────────────► Veracode DAST (against API endpoints via APIM/test URL)

│ - OWASP Top 10, auth, headers, SSRF/XSS/SQLi

├──────────────► Veracode IAST Agent (optional) observes real test traffic

│ - finds deep runtime vulns/dataflows in services

├──────────────► Infra-as-Code Scan (Terraform/Bicep → Checkov/Terraform-validate)

└──────────────► Compliance Bundle: SAST+SCA+DAST+IAST+Container reports

(publish to Azure DevOps + ticket auto-create on fail)


│ (Manual/Automated Approval Gate: Security + QA sign-off)

┌─────────────────────────────────────────────────────────────────────────────┐

│ STAGE / PRE-PROD (AKS-STAGE) │

├─────────────────────────────────────────────────────────────────────────────┤

│ Blue/Green or Canary with Istio traffic split │

│ Repeat: DAST (full) + Performance/Soak + Chaos tests │

│ Policy Gate: Only proceed if risk score ≤ threshold │

└─────────────────────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────────────────────┐

│ PROD DEPLOY (AKS-PROD – ACTIVE/ACTIVE) │

├─────────────────────────────────────────────────────────────────────────────┤

│ Regions: South India & West India │

│ Ingress: Front Door (WAF) → App Gateway (WAF) → APIM (private) → AKS │

│ Data: SQL MI (private EP), Cosmos DB (multi-region), Kafka/Event Hubs, Redis│

│ Post-deploy: App Insights/Log Analytics, Defender for Cloud, WAF logs │

│ Optional: Veracode RASP for runtime protection │

└─────────────────────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────────────────────┐

│ FEEDBACK / GOVERNANCE / CONTINUOUS IMPROVEMENT │

├─────────────────────────────────────────────────────────────────────────────┤

│ Azure Policy + Blueprints: enforce private endpoints, tags, NSGs │

│ CVE/Vuln tickets auto-created (ADO Boards/Jira) │

│ Mean Time to Remediate (MTTR) & Risk burn-down dashboards │

└─────────────────────────────────────────────────────────────────────────────┘

 
 
 

Recent Posts

See All
EA Day to Day Activity

🔹 Typical Day-to-Day Activities (Enterprise Architect – Digital Lending Program) 1. Start of Day – Communication & Prioritization Read &...

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
  • Facebook
  • Twitter
  • LinkedIn

©2024 by AeeroTech. Proudly created with Wix.com

bottom of page