Are you sure you've revoked all the credentials for the summer intern? This is a fun seasonal deep-dive into what we can learn from Halloween ceremonies.
When talking about application authorizations, we often encounter two concepts RBAC (role-based access control) and ABAC (attribute-based access control).
MySQL brands itself as the world's most popular open source database. It has a corpus of tools and tutorials to automate MySQL, SQL injection and a notorious list of past vulnerabilities; as popular as MySQL database is among developers and SQL enthusiasts, it is equally popular among hackers.
In this post, we briefly talk about accessing AWS resources using Cognito Identiy Pool and how you use it combination with AWS STS (Security Token Service) to provide temporary credentials.
In this post, we briefly talk about leveraging the right type of AWS IAM policy mechanisms to build the responsibility separation between the “central” team and the individual “development” team.
Guide to OAuth: OAuth exists to provide third party applications limited access to secure resources without compromising the user’s data.