<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Alexander Delgado</title>
    <description>The latest articles on Forem by Alexander Delgado (@securitylater).</description>
    <link>https://forem.com/securitylater</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F123454%2F17416e97-5cfb-4ccd-8550-a1aecea320cd.jpg</url>
      <title>Forem: Alexander Delgado</title>
      <link>https://forem.com/securitylater</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/securitylater"/>
    <language>en</language>
    <item>
      <title>A Strategy for Passing AWS Certifications</title>
      <dc:creator>Alexander Delgado</dc:creator>
      <pubDate>Sun, 26 Apr 2020 18:02:39 +0000</pubDate>
      <link>https://forem.com/securitylater/a-strategy-for-passing-aws-certifications-m5g</link>
      <guid>https://forem.com/securitylater/a-strategy-for-passing-aws-certifications-m5g</guid>
      <description>&lt;p&gt;I passed the AWS Solutions Architect - Associate and the AWS Certified Security - Specialty exams using the strategy I'm about to outline. I acknowledge that everyone learns differently and what works for some may not work for others but I do think this is a good strategy to follow if you're trying to pass any of the exams. &lt;/p&gt;

&lt;h1&gt;
  
  
  Courses
&lt;/h1&gt;

&lt;p&gt;If you or your employer can pay for a course to prepare for the exam I highly recommend doing it. In order to see what course you should take I like searching r/AWSCertifications on reddit and looking at what courses people are recommending for the exam you want to take. &lt;/p&gt;

&lt;p&gt;From my personal experience if you're taking the AWS Solutions Architect - Associate exam then I highly recommend &lt;a href="https://www.udemy.com/course/aws-certified-solutions-architect-associate-saa-c02/"&gt;Stephane Maarek's course&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When I took the AWS Certified Security - Specialty exam I took the &lt;a href="https://linuxacademy.com/course/aws-certified-security-specialty/"&gt;Linux Academy&lt;/a&gt; course and highly recommend it as well. &lt;/p&gt;

&lt;p&gt;Once you've decided on what course you're going to take you need to &lt;strong&gt;stick with it.&lt;/strong&gt; It's easy to get analysis paralysis when looking at all the options. Find one and stick with it until the end. &lt;/p&gt;

&lt;h1&gt;
  
  
  Hands-on Experience
&lt;/h1&gt;

&lt;p&gt;Every AWS certification recommends that you have hands on experience. If you don't have any hands on experience don't worry! If you're taking a course sometimes they will have hands on labs that give you hands-on experience. If you're not taking one of these courses with labs included you can sign up for the &lt;a href="https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&amp;amp;all-free-tier.sort-order=asc"&gt;AWS Free Tier&lt;/a&gt; and follow along in your own account! Just make sure to clean up so you don't go over any of your free quota's. &lt;/p&gt;

&lt;h1&gt;
  
  
  Whitepapers
&lt;/h1&gt;

&lt;p&gt;You can supplement your learning with &lt;a href="https://aws.amazon.com/whitepapers/?whitepapers-main.sort-by=item.additionalFields.sortDate&amp;amp;whitepapers-main.sort-order=desc"&gt;AWS Whitepapers&lt;/a&gt;. These are great resources to dig deeper into a topic and provide a wealth of information. I found these to be especially useful when taking the AWS Certified Security - Specialty exam because it requires deep knowledge on services like KMS. That being said, they still have Whitepapers that are great for an introduction to AWS. Just keep what you will be tested on in mind and don't worry about knowing everything in a Whitepaper. &lt;/p&gt;

&lt;h1&gt;
  
  
  Practice Exam
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Practice exams will make or break you in the real exam.&lt;/strong&gt; AWS exams have a certain wording and strategy to answering them and in order to best prepare for that I highly recommend taking practice exams.&lt;/p&gt;

&lt;p&gt;Some courses come with practice exams and you should definitely take those. Depending on the exam you want to take there will also be practice exams that you can buy and these are extremely beneficial. When I took the AWS Solutions Architect - Associate exam &lt;a href="https://www.udemy.com/course/aws-certified-solutions-architect-associate-amazon-practice-exams-saa-c02/"&gt;Jon Bonso's practice tests&lt;/a&gt; really helped me here. &lt;/p&gt;

&lt;h1&gt;
  
  
  Scheduling the Exam
&lt;/h1&gt;

&lt;p&gt;When I took the exams they were required to be taken in person but you can take them online now! Regardless of the format in which you take your exam here are my tips: &lt;/p&gt;

&lt;h2&gt;
  
  
  1. Schedule the Exam When You Start Studying
&lt;/h2&gt;

&lt;p&gt;This will ensure that you have a goal with a specific date in mind and will drive you to actually study. If you schedule the exam when "you think you're ready" you will push the exam back. It's nerve wracking and no one feels absolutely ready when they take the exam. But if you've studied then trust me you will be in a great position to take the exam by the time it rolls around!&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Know When You're the Most Focused
&lt;/h2&gt;

&lt;p&gt;I'm the most focused in the early morning so I generally schedule my exams as early as I can. If you know that you can't focus in the morning though don't schedule them in the morning! In general most people find it hard to focus after a meal or in the middle of the day but maybe that's when you focus best. Figure out when that time is and schedule it then. &lt;/p&gt;

&lt;h1&gt;
  
  
  Recap
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;Find a great course. Look online for reviews and what people are saying about it. Once you find one &lt;strong&gt;stick with it.&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;Get hands on experience if you can&lt;/li&gt;
&lt;li&gt;Supplement what you're learning with Whitepapers&lt;/li&gt;
&lt;li&gt;Take every practice test you can find! These will make or break you.&lt;/li&gt;
&lt;li&gt;Schedule the exam as soon as you start studying for it and schedule it for a time in the day when you know you're focused&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Good luck and trust the process! &lt;a href="https://twitter.com/securitylater"&gt;You can follow me on Twitter&lt;/a&gt; for more content, to ask me questions, or just chat.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>security</category>
      <category>architect</category>
    </item>
    <item>
      <title>Securing Terraform Code with tfsec</title>
      <dc:creator>Alexander Delgado</dc:creator>
      <pubDate>Sat, 11 Jan 2020 19:38:46 +0000</pubDate>
      <link>https://forem.com/securitylater/securing-terraform-code-with-tfsec-3980</link>
      <guid>https://forem.com/securitylater/securing-terraform-code-with-tfsec-3980</guid>
      <description>&lt;h1&gt;
  
  
  What is it?
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://github.com/liamg/tfsec"&gt;tfsec&lt;/a&gt; is an open source static code analyzer for Terraform code. It will look at your Terraform and alert against any deviations from best practices. Currently it has the capabilities of checking AWS, Azure, and GCP cloud resources. There are also a few cloud agnostic checks included now.&lt;/p&gt;

&lt;h1&gt;
  
  
  Why would I use it?
&lt;/h1&gt;

&lt;p&gt;Terraform allows you to create cloud resources and even if your Terraform code is perfect it is really easy to create a misconfigured cloud resource. This could lead to a security compromise, leaving data exposed publicly, or leaving your resources open to attack. &lt;/p&gt;

&lt;p&gt;If you're someone responsible for maintaining the security of your infrastructure or the security posture of your Terraform code then &lt;code&gt;tfsec&lt;/code&gt; is a great tool and to be running in your CI pipeline. For example you can run it in your CI pipeline and fail a build if &lt;code&gt;tfsec&lt;/code&gt; detects any issues.&lt;/p&gt;

&lt;h1&gt;
  
  
  Who wrote it?
&lt;/h1&gt;

&lt;p&gt;&lt;code&gt;tfsec&lt;/code&gt; was created by &lt;a href="http://www.liam-galvin.co.uk/"&gt;Liam Galvin&lt;/a&gt; and is on &lt;a href="https://github.com/liamg/tfsec"&gt;GitHub&lt;/a&gt; now with 3 contributors (at the time of writing this) including Liam.&lt;/p&gt;

&lt;h1&gt;
  
  
  How can I get it?
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;You can download binary from the &lt;code&gt;tfsec&lt;/code&gt; &lt;a href="https://github.com/liamg/tfsec/releases"&gt;releases page&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You can install it with &lt;a href="https://brew.sh/"&gt;Homebrew&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;brew&lt;/span&gt; &lt;span class="n"&gt;tap&lt;/span&gt; &lt;span class="n"&gt;liamg&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;tfsec&lt;/span&gt;
&lt;span class="n"&gt;brew&lt;/span&gt; &lt;span class="n"&gt;install&lt;/span&gt; &lt;span class="n"&gt;liamg&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;tfsec&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;tfsec&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;You can install with Go
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;env &lt;/span&gt;&lt;span class="nv"&gt;GO111MODULE&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;on go get &lt;span class="nt"&gt;-u&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;github.com/liamg/tfsec/cmd/tfsec]&lt;span class="o"&gt;(&lt;/span&gt;http://github.com/liamg/tfsec/cmd/tfsec&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;h1&gt;
  
  
  Usage
&lt;/h1&gt;

&lt;p&gt;One of the great things about &lt;code&gt;tfsec&lt;/code&gt; is it's really easy to get started. Now that we know what &lt;code&gt;tfsec&lt;/code&gt; is and how to get it lets start using it. Below is a Terraform file that creates a standard S3 bucket and we've given it the name &lt;code&gt;tfsec-bucket&lt;/code&gt;. It's a small and boring file but shows how easy it is to create a misconfigured cloud resource.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight terraform"&gt;&lt;code&gt;    &lt;span class="k"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_s3_bucket"&lt;/span&gt; &lt;span class="s2"&gt;"b"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
      &lt;span class="nx"&gt;bucket&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tfsec-bucket"&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Create a file called &lt;code&gt;s3_bucket.tf&lt;/code&gt; with the above contents and save the file&lt;/li&gt;
&lt;li&gt;From the command line run &lt;code&gt;tfsec .&lt;/code&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;    2 potential problems detected:

    Problem 1

      &lt;span class="o"&gt;[&lt;/span&gt;AWS002][ERROR] Resource &lt;span class="s1"&gt;'aws_s3_bucket.b'&lt;/span&gt; does not have logging enabled.
      /tfsec_test/s3_bucket.tf:1-3

           1 | resource &lt;span class="s2"&gt;"aws_s3_bucket"&lt;/span&gt; &lt;span class="s2"&gt;"b"&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
           2 |   bucket &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tfsec-bucket"&lt;/span&gt;
           3 | &lt;span class="o"&gt;}&lt;/span&gt;
           4 | 

      See https://github.com/liamg/tfsec/wiki/AWS002 &lt;span class="k"&gt;for &lt;/span&gt;more information.

    Problem 2

      &lt;span class="o"&gt;[&lt;/span&gt;AWS017][ERROR] Resource &lt;span class="s1"&gt;'aws_s3_bucket.b'&lt;/span&gt; defines an unencrypted S3 bucket &lt;span class="o"&gt;(&lt;/span&gt;missing server_side_encryption_configuration block&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
      /tfsec_test/s3_bucket.tf:1-3

           1 | resource &lt;span class="s2"&gt;"aws_s3_bucket"&lt;/span&gt; &lt;span class="s2"&gt;"b"&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
           2 |   bucket &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tfsec-bucket"&lt;/span&gt;
           3 | &lt;span class="o"&gt;}&lt;/span&gt;
           4 | 

      See https://github.com/liamg/tfsec/wiki/AWS017 &lt;span class="k"&gt;for &lt;/span&gt;more information.
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;&lt;code&gt;tfsec&lt;/code&gt; tells you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The number of potential problems it found:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;2 potential problems detected&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The rule number of the detected problem:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;[AWS002]&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The resource identifier with the problem:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;aws_s3_bucket.b&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What the problem is:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;does not have logging enabled.&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The file path and the lines where it detected the problem:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;/tfsec_test/s3_bucket.tf:1-3&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The Terraform code of the resource with line numbers:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;           1 | resource &lt;span class="s2"&gt;"aws_s3_bucket"&lt;/span&gt; &lt;span class="s2"&gt;"b"&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
           2 |   bucket &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tfsec-bucket"&lt;/span&gt;
           3 | &lt;span class="o"&gt;}&lt;/span&gt;
           4 |
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;A link to more information about the finding&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://github.com/liamg/tfsec/wiki/AWS002"&gt;&lt;code&gt;https://github.com/liamg/tfsec/wiki/AWS002&lt;/code&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Summary
&lt;/h1&gt;

&lt;p&gt;Just like with everything in security &lt;code&gt;tfsec&lt;/code&gt; should be just another layer in your &lt;a href="https://en.wikipedia.org/wiki/Defense_in_depth_(computing)"&gt;defense-in-depth&lt;/a&gt; approach to securing your assets and cloud infrastructure resources and absolutely not the end-all-be-all for your cloud security. &lt;/p&gt;

&lt;p&gt;With that being said &lt;code&gt;tfsec&lt;/code&gt; is a great tool and I'm really glad to see security tooling created and developed around Terraform. Hopefully this made you want to check it out!&lt;/p&gt;

</description>
      <category>security</category>
      <category>cloud</category>
      <category>terraform</category>
      <category>devops</category>
    </item>
    <item>
      <title>What is Terraform?</title>
      <dc:creator>Alexander Delgado</dc:creator>
      <pubDate>Sat, 06 Jul 2019 21:50:05 +0000</pubDate>
      <link>https://forem.com/securitylater/what-is-terraform-43f7</link>
      <guid>https://forem.com/securitylater/what-is-terraform-43f7</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;This post covers what Terraform is and what the benefits of using it are. &lt;/p&gt;

&lt;p&gt;Terraform is a tool that allows you to define and create resources. The way that Terraform accomplishes this is the best part. Terraform uses easy to read statements with configuration data to create those resources. &lt;/p&gt;

&lt;p&gt;Managing your resources this way is known as &lt;strong&gt;infrastructure as code&lt;/strong&gt;. Instead of creating and managing resources and their configurations through interactive configuration tools you are now doing it through machine readable Terraform files. &lt;/p&gt;

&lt;h3&gt;
  
  
  Example
&lt;/h3&gt;

&lt;p&gt;If you wanted to create a repository on GitHub using Terraform you would create a terraform file with the following in it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight terraform"&gt;&lt;code&gt;&lt;span class="k"&gt;provider&lt;/span&gt; &lt;span class="s2"&gt;"github"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;token&lt;/span&gt;        &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="k"&gt;${&lt;/span&gt;&lt;span class="kd"&gt;var&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;github_token&lt;/span&gt;&lt;span class="k"&gt;}&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;
  &lt;span class="nx"&gt;organization&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="k"&gt;${&lt;/span&gt;&lt;span class="kd"&gt;var&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;github_organization&lt;/span&gt;&lt;span class="k"&gt;}&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="k"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"github_repository"&lt;/span&gt; &lt;span class="s2"&gt;"my_awesome_repo"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;name&lt;/span&gt;        &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"my_awesome_repo"&lt;/span&gt;
  &lt;span class="nx"&gt;description&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"My awesome repo"&lt;/span&gt;
  &lt;span class="nx"&gt;private&lt;/span&gt;     &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="kc"&gt;false&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;This is telling Terraform to create a GitHub repository with the name "my_awesome_repo" and a description "My awesome repo". When you apply this configuration Terraform will create that resource for you. Just like that!&lt;/p&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;"Why Do I need this? I could easily script this using python or my favorite high level language." &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That's true. Terraform, however, comes with many out-of-the-box features that you're not going to get by scripting the creation of resources yourself. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Terraform is able to keep state. It knows what resources you have created, what resources it'll need to create, which resources it needs to update, and which resources it will need to delete. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Terraform has a &lt;code&gt;plan&lt;/code&gt; command that when ran will tell you exactly what resources will be created, modified, or deleted. This is really handy to ensure you're creating what you want to be creating and there are no surprises. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Terraform can graph your resources and tell you what resources have dependencies. This gives you, the operator, a lot of insight about your resources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Terraform creates and modifies resources without dependencies in parallel to build infrastructure efficiently.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One of the biggest benefits that you get from Terraform is &lt;strong&gt;workflow portability&lt;/strong&gt;. Whether you're working on resources in GitHub, BitBucket, AWS, Azure, DigitalOcean or anything else, your workflow looks the same &lt;em&gt;no matter what service or provider you're working with&lt;/em&gt;. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;You create your Terraform configuration files&lt;/li&gt;
&lt;li&gt;You run &lt;code&gt;terraform init&lt;/code&gt; to initialize the current directory&lt;/li&gt;
&lt;li&gt;You run &lt;code&gt;terraform plan&lt;/code&gt; to see what resources will be created&lt;/li&gt;
&lt;li&gt;You run &lt;code&gt;terraform apply&lt;/code&gt; to create those resources &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Compare this to having to know where to look and how to configure each service that you're working on individually. &lt;/p&gt;

&lt;p&gt;Terraform is awesome and comes with many benefits. I highly encourage anyone that is interested in infrastructure or devops to dive right in and start learning it as it is a great tool to have in your toolbox. &lt;/p&gt;

&lt;h3&gt;
  
  
  Resources &amp;amp; Learning More
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://learn.hashicorp.com/terraform/"&gt;Learning Terraform&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.terraform.io/docs/index.html"&gt;Terraform Docs&lt;/a&gt;&lt;br&gt;
&lt;a href="https://blog.gruntwork.io/a-comprehensive-guide-to-terraform-b3d32832baca"&gt;A Comprehensive Guide to Terraform&lt;/a&gt;&lt;/p&gt;

</description>
      <category>terraform</category>
      <category>devops</category>
      <category>cloud</category>
      <category>infrastructure</category>
    </item>
  </channel>
</rss>
