How Pomerium Enables Crusoe to Rapidly Develop and Deploy Secure Applications
Nitin Perumbeti is Chief Technology Officer (CTO) at Crusoe Energy Systems. Before joining Crusoe, Nitin was a co-founder of Battlestar Capital and Bright.com, an AI powered job search service that was acquired by LinkedIn in 2014. Nitin also worked as a software engineer for FreeCause, which was acquired by Japanese tech giant Rakuten. Nitin is a graduate of MIT and holds a BS in Computer Science and Electrical Engineering.
Crusoe Energy Systems aims to help the oil industry harness stranded energy released by routine natural gas flaring – the process of burning off excess natural gas at the wellhead where no pipeline options are available. The methane is burned to convert it to CO2, but releasing large amounts of CO2 is still harmful to the environment. Crusoe designed a solution to repurpose the wasted energy contained in the natural gas for powering high-performance data centers. Crusoe currently has several dozen employees and is quickly expanding.
Like many companies using Pomerium, Crusoe did not want to reinvent authentication and authorization for every application they were building. On top of cloud-native apps such as Grafana, Kibana, and Chronograf, Crusoe is constantly designing and developing new internal apps that need regulated third-party access controls. Crusoe’s architecture also includes many different endpoints that connect servers out in the field with data-centers and users to those servers – all of which need to be secured. For these reasons, Crusoe wanted to find an identity-aware proxy they could quickly spin-up in their environment and easily configure for every new app they build.
Clear and Concise Code
The first thing that drew Nitin and Crusoe to Pomerium was the source code’s clarity and integrity. Because Pomerium is an open-source product, Nitin was able to verify the quality of Pomerium:
The repo was relatively new, but the code was extremely concise and clear and I was able to follow through it pretty quickly and understand what’s going on behind the scenes – and the documentation was incredible.Nitin Perumbeti, CTO at Crusoe Energy Systems
After Nitin read and understood the code, it took him only one or two hours to walk through Pomerium’s documentation and get it up and running. Nitin was especially grateful for the guidance in making Pomerium work with Google Groups:
We configured Pomerium with Google Groups that first day two years ago now, and haven’t had to go back into those settings at all… so it was pretty easy.Nitin Perumbeti, CTO at Crusoe Energy System
Faster internal app development
Pomerium enables Crusoe to not have to spend time building authentication and authorization for every new internal application they create. With Pomerium, Crusoe can quickly designate access to any of their applications by simply adjusting policy controls within their identity provider. With a rapidly growing and disruptive startup like Crusoe, time is of the essence when developing and deploying new apps.
When you don’t have to worry about provisioning users and user-databases, it makes spinning up internal tools that much easier.Nitin Perumbeti, CTO at Crusoe Energy System
Crusoe is excited to see how Pomerium’s future capabilities can serve their company as it expands. The most interesting upcoming features for Crusoe are centralized Kubernetes and SSH access. Because Crusoe’s server farms operate in remote natural gas fields, their engineers must continuously access servers and clusters remotely, while also protecting against bad actors that may attempt to compromise those machines. Crusoe is looking forward to leveraging Pomerium-managed Kubernetes and SSH access for provisioning and de-provisioning access to internal apps and server farms in the field. To learn more about what Crusoe does and how you can get involved, please check out their website here.