Improving software delivery in every organisation



  1. Increase the reliability of services
  2. Ensure compliance with international security standards
  3. Reduce the chance of knowledge silos developing within teams


Demonstrate understanding of:

  1. Making a service Scalable
  2. Making a service Highly Available
  3. Principle of Least Privilege
  4. Zero-downtime deployments


The infra badge assessments are designed to be undertaken in any order, Spider is recommended to be taken first

Ant (Level 1)


Be able to set up a highly available, internet-facing web application.


  1. What are IaaS, PaaS, and FaaS?
    1. For each of these; Discuss a scenario where the technology is appropriate
    2. For each of these; Discuss a scenario where the technology is not appropriate
  2. What is the importance of having a highly available service?


You will be provided a Linux Container Image, though you can use your own if you wish.

  • Run the image with your choice of IaaS.
  • Make the service highly available
  • Draw a diagram of your infrastructure
  • Demonstrate that you can remove an instance, and your infrastructure will self-heal
  • Demonstrate that you can roll out a new deployment without causing any downtime. Use the provided downtime detection script.

Spider (Level 2)

Be able to make secure cloud applications and services.



    • no need to read this entire article ^ section V is relevant


There is a cloud-hosted public web server that talks to a backend API in a private network. The private server’s network allows the IP of the public server via an allow list rule on its Firewall.

  1. Explain what maintenance overhead IP allow-listing adds for future developers?
  2. Explain the security problems with using only IP allow-listing for authentication?
  3. What are the benefits of investing in monitoring and alerting in software environments?


  • You will need to show and demonstrate a infrastructure as code project (e.g. terraform) that can setup and teardown the following:
    • 2 file storage buckets (or azure blob storage containers)
    • A new user with a set of access credentials that only has permission to retrieve (*not list or modify) files in one bucket
    • Enable request monitoring on the bucket so that the assessor can get the number of HTTP GET requests made to bucket over time.
    • You will be asked to setup and take down you infa

Bee (Level 3)





Provider requirements

There are certain providers, usually PaaS only providers, that do not offer the the functionality we require for testing people on all the above aspects.

As such, we recommend avoiding solutions that hide:

  • load balancing
  • autoscaling
  • networking rules (routing, Firewalls)

Providers that can definitely be used are:

  • AWS
    • ECS with FARGATE is fine, though be prepared for increased theory work around deployment processes
    • Lambda is not recommended, as it hides a lot of networking rules, autoscaling, and deployment processes
    • Elastic Beanstalk is not allowed, as it does everything for you, but in a way that makes it hard to adapt after the fact.
  • Azure
  • GCP


Downtime Script

target="<your endpoint>"
while :; do
 if (curl -m 1 "$target" &>/dev/null); then
   printf '.'
   echo "target is down"
 sleep 0.5