Security

young business people working with digital tablet while discussing together in conference room

Spring Boot Rest Authentication with JWT

Reading Time: 6 minutes In this tutorial, we will create a simple Spring boot application that uses the JWT authentication to protect a REST API. For this, we use Spring security and web configuration for the token generation. In this, we create an example that uses the REST POST/GET API to generate the JWT token, and the user who has the valid token they only have able to access Continue Reading

background

Quickstart with the HashiCorp vault

Reading Time: 2 minutes Vault is a secret management service by HashiCorp. It is a tool that will help you in storing secrets(API keys, passwords, etc) and accessing them securely. You can use Vault with a user interface as well as through CLI. Vault operates as a client/server application. The Vault server is the only piece of the Vault architecture that interacts with the data storage and backends. All Continue Reading

Spring Cloud GCP IAP Authentication and Authorization 

Reading Time: 2 minutes Identity-Aware Proxy (IAP) establish a central authorization layer for applications accessed by HTTPS, so we can use an application-level access control model instead of relying on network-level firewalls. IAP policies scale across organization. We can define access policies centrally and apply them to all of applications and resources. When you assign a dedicated team to create and enforce policies, we protect project from incorrect policy Continue Reading

What is Cryptography in network security? Type of Cryptography.

Reading Time: 4 minutes Cryptography is the study of security over communication between senders and receivers message so that only right recipient can get the message and processed it

JWT

Reading Time: 3 minutes JWT stands for JSON Web Token. It is basically used to transform some information between two parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with HMAC algorithm) or a public/private key pair using RSA. JWT is very compact in size, we can send it through the HTTP header, Post parameter, etc. It’s Continue Reading

Spring Security: How it works internally

Reading Time: 5 minutes Definition Spring Security is a framework provided by Spring that helps to customize an access and authentication process. It plays a very crucial role in terms of securing the applications. Spring Security, mainly focuses on authentication and authorization to provide all benefits to java applications. It is very helpful and provides an easy approach to apply in real projects. And, permits to do custom modifications Continue Reading

Information Security

Reading Time: 5 minutes Introduction Being in 21st century, seeing technological transformations is not a big deal any more. Today where there are no limits to the enhancements of technological aspects, it has become possible for one to get all his day to day work done using technologies like desktops and mobile phones, while sitting on a chair. It is now easy for one to reach any point or Continue Reading

dev-tools

Dev Tools to the Rescue – Part 2

Reading Time: 6 minutes In my previous article Dev Tools to the Rescue – Part 1, we looked at some of the best developer tools for software development, project management, continuous delivery/integrity, designing, testing, etc. In this article, we’ll continue with tools that are helpful for purposes like monitoring, analysis, cloud development, security, etc. Confluence Confluence is a team collaboration application that allows teams to work together and share Continue Reading

Audit DC/OS Service via Prometheus/Filebeat

Reading Time: 3 minutes In our previous blog post, How to audit DC/OS Services?, we learned how to locally audit service/app in DC/OS via dcos-adminrouter.service. This blog is in continuation of the previous one and here we will explore how we can audit DC/OS Service via Prometheus /Filebeat. Quick Recap We have seen that DC/OS doesn’t provides any web interface is to track the change in service/app configs , Continue Reading

How to audit DC/OS Services?

Reading Time: 4 minutes DC/OS is a distributed systems kernel that lets you manage multiple machines as if they were a single computer. Its included web interface facilitates user to interact with its services. Now, this is where it gets quite messy to keep track of the users who are interacting with the services running in the cluster. It is the responsibility of the cluster-admin to keep track and Continue Reading

Threat Modelling: An Overview

Reading Time: 3 minutes A secure architecture has become the need of the hour for almost everyone. As a result, no one needs any vulnerabilities in their clusters. But is it wise to add security after a mishap has occurred? What if we can identify potential risks at the time of development itself? This is exactly where Threat Modelling fits almost perfectly while helping organisations excel in creating more Continue Reading

Understanding DevSecOps for Kubernetes

Reading Time: 4 minutes Increase in Security Demands for Cloud Native Ecosystems In today’s world, the need for securing our cloud native clusters has increased more than ever. Also this year, cloud-native security is again top trending, according to a report published by Gartner. DevSecOps is a simple answer to multiple questions. In the recently concluded KubeCon 2020, we saw that a lot of organisations are taking huge strides Continue Reading

Knoldus-Blog-Monitoring-Solution-with-rust

Monitoring solutions reduce costs & lead to better asset utilization

Reading Time: 2 minutes In a world where the future’s uncertain and businesses are compelled to embrace digital solutions, an unreliable IT infrastructure is out of the question. After all, you cannot afford application outages, security breaches, or system downtimes as they can harm business continuity. According to Gartner, the average cost of IT downtime is $5,600 per minute, which varies across industries. However, the right monitoring tools provide Continue Reading