Defense in depth
I treat every layer like it's the only one — network, identity, data, app. Bonus points for least privilege actually being least.
$ whoami
The README behind the portfolio — what I care about, what makes me tick, and a few jokes you're contractually obliged to groan at.
Security isn't a tab in the project plan — it's a thread that runs through every decision. Here's how I think about it on Azure (and beyond).
I treat every layer like it's the only one — network, identity, data, app. Bonus points for least privilege actually being least.
“Never trust, always verify.” Yes, even that internal VNet you swore was safe.
Conditional Access, MFA, PIM, managed identities — the boring stuff that prevents the loud incidents.
Reading post-mortems, MITRE ATT&CK, and the occasional CVE feed instead of doom-scrolling.
A field guide to the acronyms I drop in code reviews, Slack threads, and client meetings — slightly more often than I should.
RTFM
Read The Fine Manual (yes, the polite version)
PEBKAC
Problem Exists Between Keyboard And Chair
ID-10-T
A user error, written like a bug ticket
YAGNI
You Aren't Gonna Need It
KISS
Keep It Simple, Stupid
DRY
Don't Repeat Yourself
WET
Write Everything Twice — the anti-pattern of DRY
WONTFIX
It's not a bug, it's a feature
LGTM
Looks Good To Me — pairs nicely with “SHIP IT”
TL;DR
Too Long; Didn't Read
IaC
Infrastructure as Code — and as documentation
MFA
Multi-Factor Authentication — please, just turn it on
BOFH
Bastard Operator From Hell — folklore, not a job title
404
Brain not found. Try caffeine.
418
I'm a teapot. ☕
$ echo "Thanks for scrolling. May your deploys be green and your alerts be quiet."