T-Rex Introduces Cloud to Cloud via Containers (C3)

T-Rex Introduces Cloud to Cloud via Containers (C3)

Date: October 7, 2020

Containerization, Multi-Cloud and portability are fundamental to any successful Cloud migration. As part of the T-Rex SMART® Framework which we use to modernize and secure IT infrastructure, T-Rex has developed a Cloud to Cloud via Containers (C3) portability strategy.  This strategy leverages containerization within a multi-cloud environment to alleviate Cloud Service Provider (CSP) lock-in and fully integrate DevSecOps with a common platform.

Throughout T-Rex SMART®, C3 is used to implement a container platform, such as OpenShift in Amazon Web Services (AWS) and then in Azure. We build, secure, deploy and run this container in Amazon and then move the container to run in Azure. A future enhancement will automate the move across CSPs. This demonstrates the viability of using containers to achieve cloud portability. We apply container security following DevSecOps principals and implement Continuous Integration/Continuous Deployment (CI/CD) container pipelines to provide continuous build and run-time monitoring and scanning.  The diagram below shows how this process works:

T-Rex C3 is beneficial in many ways. It proves that you can use containers in a cloud agnostic fashion. By not using CSP Managed Services, the level of effort required to move containers from Cloud A to Cloud B is reduced. Additionally, C3 reduces program start-up costs with reference documentation and patterns that can be quickly rolled out to new CSP environments, saving time and money.

To learn more about T-Rex’s methodologies, check out the following:

For more information, send us an email at info@trexsolutionsllc.com.


recently posted
T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]

Dr. Allen Harper on How T-Rex Helps Federal Agencies Meet the Zero Trust Challenge

Dr. Allen Harper on How T-Rex Helps Federal Agencies Meet the Zero Trust Challenge

The White House Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” calls for Federal agencies to adopt and implement zero trust architecture. In a recent interview with Washington Exec, T-Rex’s Executive Vice President of Cybersecurity Dr. Allen Harper discusses the […]