Secrets Management

Secrets management is a practice that allows developers to securely store sensitive data such as passwords, keys, and tokens, in a secure environment with strict access controls. A common person connected to the internet must use a few dozen of…

Microservices

This post summarizes ideas about microservices, that is a type of distributed system. This post is part of a series of articles about distributed systems. Description of Microservices IT microservices is a service-oriented architecture (SOA) where the application is splitted…

Software-defined Network

A software-defined network (SDN) is an approach to network management that enables dynamic and programmatically network configuration. This is a contrast with traditional networks, where the network is defined by using hardware components. An SDN looks like a single logical…

Database Security

This post explains some aspects of IT security on databases. It is part of the main post about introduction to IT security. Database Concurrency Issues Lost updates occur when one transaction writes a value to the database that overwrites a…

How to get the CCSP Certification

Certified Cloud Security Practitioner (CCSP) is a certification focused on cloud security and issued by American non-profit organization ISC(2) CCSP certification is more detailed than CCSK certificate, that is issued by Cloud Security Alliance (CSA). Some recommend to obtain CCSK…

Kerberos

Kerberos is both an ticket-based Authentication, Authorization and Accountability (AAA) network protocol and a SSO implementation: It is the most common ticket system, used for example in on-premise Windows networks. Kerberos issues tickets that can be presented to various services…