Back

Infrastructure as Code Live Demo (Video)

Infrastructure as Code What is Infrastructure as CodeIn traditional IT a server gets requested from the IT department and they must spi...

3 min read
Published on Apr 10, 2019
Infrastructure as Code Live Demo (Video)

Infrastructure as Code

What is Infrastructure as Code?

In traditional IT, a server gets requested from the IT department, and they must spin it up, add storage, add apps, check configuration, and add any additional resources needed. A server cluster for a web app, that is going to take even more time. Infrastructure as Code is an IT management methodology that uses descriptive models, typically JSON,  to rapidly deploy technology stacks and cloud resources. While it is critical for development teams working in a DevOps environment, it is also a powerful way to manage any type of infrastructure. Some of the benefits of software-defined infrastructure include:

  • Source Control for Resources - Using tools like Azure DevOps, Git.
  • Automatic testing
  • Elimination of configuration drift

What are ARM Templates?

Azure Resource Manager (ARM) Templates are documents that describe a resource within Azure. That resource can be a virtual machine, storage, database, load balancer, virtual network, etc. The documents, usually in JSON, are declarative, meaning you state “what you intend to create” without having to script the sequence of commands needed to create it, instead you declare the properties of the resource you want to create, and Azure Resource Manager does the rest. This is much easier than automating resource creation through scripted configs, as it eliminates the need to code individual command sand configurations.

ARM templates are incredibly flexible, as they can be written directly in JSON, or they can be built using the Azure Resource Manager interface, Visual Studio, and the Azure Editor. The template then exported to JSON, Powershell, or even Ruby for management and source control. It can then be deployed using Azure, Visual Studio, or Powershell. Additionally, you can release your ARM Templates onto the Azure Marketplace for sale or sharing.

What is Desired State Configuration?

Desired state configuration is a PowerShell based method of configuring resources. DSC consists of three primary components:

  • Configurations - Declarative PowerShell scripts that define configurations of resources. When run, they ensure the resource exists in the desired configuration
  • Resources - These contain the code that set and maintain the target of a configuration in the desired state.
  • Local Configuration Manager- The engine behind DSC. This manages the relationship between the configurations and resources and makes sure that the desired state is maintained. If the configuration changes, the LCM will run the code needed to return the resource to the desired state.

Read the Microsoft DSC documentation here.

What is Enterprise Scaffolding

Enterprise scaffolding is a set of flexible controls that provide structure to the environment. The scaffold empowers admins to ensure that workloads meet the minimum governance requirement of the organization while still permitting business units to meet their own goals. The best analogy is that it allows you to stock your infrastructure tool shed with the exact tools your organization needs while restricting tools they do not. This can assure that all new resources follow naming conventions, have appropriate security and compliance controls and meet predefined needs.

Watch the Demonstration

Do you want the added security, resiliency and stability that code based infrastructure can provide? Agile IT is AWS Certified and a Microsoft Gold DevOps Partner.

Let us know about your environment for a free quote.

Agile IT Tech Talks are a resource for our MSP and CSP clients and feature engineers and solution architects providing introductions to new functions and walkthroughs of best practices combined with a private Q&A to allow our clients to explore how they can be applied in their own environments and organizations. To find out more, schedule a call with a cloud service advisor today.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Defending Against Email Compromise

Defending Against Email Compromise: Safeguarding Accounting & Procurement

Discover how to defend accounting and procurement teams from email compromise in the Defense Industrial Base. Learn CMMC-aligned best practices using Microsoft 365.

Jul 15, 2025
4 min read
Technical vs. Process Controls in CMMC Compliance

Understanding Technical vs. Process Controls for CMMC Compliance

Understand the difference between technical and process controls in CMMC compliance. Learn how both work together to protect FCI and CUI data effectively.

Jul 14, 2025
4 min read
20 Essential Questions to Ask a Managed Service Provider

Top Questions to Ask Your Managed Service Provider (MSP)

Looking for a new MSP? Stay ahead with the top questions to ask—from security and scalability to pricing and offboarding. Vet your provider with confidence.

Jul 12, 2025
5 min read
Overview of CMMC 2.0 and Its Levels: DoD Compliance Guide

CMMC 2.0 Explained: Levels, Compliance Requirements, and Key Changes

CMMC 2.0 simplifies cybersecurity requirements for DoD contractors. Explore an overview of its levels, key changes from CMMC 1.0, and what each level means for compliance.

Jul 11, 2025
6 min read
Microsoft Licensing and CMMC - How Does It Work?

CMMC + Microsoft 365 = 😵‍💫? Maggie has thoughts for you

Not sure which Microsoft 365 licenses you need for CMMC? Agile IT's Chief Operating Officer, Maggie McGrath, has some thoughts for you.

Jul 7, 2025
9 min read
How Does CMMC Compliance Align with NIST SP 800-171?

How Does CMMC Compliance Align with NIST SP 800-171?

Learn how CMMC compliance aligns with NIST SP 800-171. Understand the security controls, certification requirements, and how both frameworks help protect Controlled Unclassified Information (CUI).

Jul 4, 2025
11 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation