End User, Security Group (JWT etc), to the Front End application, Proxy (nginx), to the API Gateway where policies are…
AWS API Gateway is extremely powerful and easy to deploy. You don’t have to manage any infrastructure (i.e. no purchasing,…
Both Kubernetes and Docker are used to deploy and manage containers. Often Docker Containers run applications within Kubernetes (K8s) node…
Here are five areas where teams can add automated security checks into development pipelines. 1. Code quality (SAST) Perhaps the…
Use Case: Migrate System APIs or SAPIs from Mule to Kong Gateway. Models: There are 2 basic deployment models when…
A common Cloud pattern especially with a container deployment model, is to use a side car in which we deploy…
Cloud native is a target model for most firms. Cloud native refers to using the native services and API integrations,…
What is Amazon Athena? Amazon Athena is a cloud-based query service for large-scale data analysis. Buyers of the product can…
Role-Based Access Control (RBAC) is a security mechanism in which each access authorization is based on roles that are assigned…
DevOps is a combination of specific engineering practices and patterns, followed by cultural changes that increase an organization’s or team’s…