<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Devops - Tag - Lee Wynne</title><link>https://leewynne.com/tags/devops/</link><description>Devops - Tag - Lee Wynne</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Tue, 31 Mar 2026 14:24:31 +0000</lastBuildDate><atom:link href="https://leewynne.com/tags/devops/" rel="self" type="application/rss+xml"/><item><title>The Secret to Near 100% AWS Tagging Compliance? People Shouldn't Know You're Doing It.</title><link>https://leewynne.com/posts/aws-tagging-compliance-secret/</link><pubDate>Tue, 31 Mar 2026 14:24:31 +0000</pubDate><author>Lee Wynne</author><guid>https://leewynne.com/posts/aws-tagging-compliance-secret/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/posts/tagging-compliance.jpeg" referrerpolicy="no-referrer">
            </div><p>Every enterprise with more than a handful of AWS accounts eventually has the same reckoning. Someone in finance asks which team owns the spend in AWS account 846241037459. Someone in security wants to know whether the resources in a particular VPC are production or development. Someone in operations needs to route an incident to the right application owner at 2am. And in every case, the answer depends on tags&hellip;. tags tags tags, never ending tags - tags that probably do not exist, may or may not be accurate, and almost certainly aren&rsquo;t consistent across business divisions.</p>]]></description></item><item><title>Build for Consumability, The Provider to Consumer Model That Makes AWS Scale.</title><link>https://leewynne.com/posts/build-for-consumability-provider-consumer-model-aws/</link><pubDate>Thu, 26 Mar 2026 17:09:59 +0000</pubDate><author>Lee Wynne</author><guid>https://leewynne.com/posts/build-for-consumability-provider-consumer-model-aws/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/posts/provider-consumer-model.jpg" referrerpolicy="no-referrer">
            </div><p>Most platform teams think their job is to build infrastructure. They&rsquo;re wrong. Their job is to build infrastructure that other teams can consume without thinking about it.</p>
<p>The difference matters more than most organisations realise. A platform team that builds a beautifully architected AWS landing zone but makes it painful to consume has built a bottleneck, not a platform. And in a large enterprise (where dozens of product teams need to ship features against real deadlines) bottlenecks don&rsquo;t just slow you down, they breed shadow IT, workaround architectures, and the kind of ungoverned sprawl that keeps security teams awake at night.</p>]]></description></item><item><title>Your DEV Credentials Shouldn't Be Able to Sink PROD</title><link>https://leewynne.com/posts/your-dev-credentials-shouldnt-sink-prod/</link><pubDate>Thu, 26 Mar 2026 10:40:01 +0000</pubDate><author>Lee Wynne</author><guid>https://leewynne.com/posts/your-dev-credentials-shouldnt-sink-prod/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/posts/dev-credentials-prod.jpg" referrerpolicy="no-referrer">
            </div><p>Most engineering teams think environment isolation means having a &ldquo;dev&rdquo; and &ldquo;prod&rdquo; flag somewhere in their deployment pipeline.</p>
<p>They&rsquo;re wrong.</p>
<p>That approach doesn&rsquo;t isolate anything, it just moves the risk around.</p>
<p>The AWS SDLC Account Pattern with Full Environment Segregation is what serious cloud architecture actually looks like. It&rsquo;s not just a best practice. It&rsquo;s the difference between teams that accidentally push breaking changes to production at 2am and teams that catch those changes before they ever leave a development branch. It&rsquo;s the difference between a breach in your DEV environment that gets contained, blast radius controlled, damage limited - and a breach in DEV that silently walks into PROD, taking customer data with it and sinking the whole ship.</p>]]></description></item></channel></rss>