security
34 posts
A grounded explainer for backend engineers: HMAC-SHA-256 for webhooks, signed URLs, and internal auth, with three-language code and the boundary where digital signatures take over.
A hardened, paste-ready setup for adding Anthropic's claude-code-action to a GitHub repo, with the security and cost knobs spelled out for production use.
How Zapier MCP provides action-level whitelisting, credential isolation, and human-in-the-loop approval for AI agents. A managed alternative to custom scoped proxies for multi-app API governance.
A deep dive into building SaaS authorization with AWS Cognito and Verified Permissions. Covers Cedar policy language, multi-tenant patterns, JWT token flow, cost analysis, and common mistakes with TypeScript examples.
A vendor-neutral evaluation of external authorization platforms including AWS Verified Permissions, SpiceDB, OpenFGA, Cerbos, and OPA. Covers architecture patterns, cost analysis, and a decision framework for engineering teams.
A deep technical comparison of Cedar, Rego, OpenFGA DSL, and Cerbos YAML/CEL policy languages. Covers syntax, performance benchmarks, formal verification, tooling, and integration patterns with TypeScript examples for each language.
A deep technical comparison of SpiceDB and Auth0 FGA (OpenFGA) -- two Zanzibar-inspired authorization systems with different trade-offs in schema design, consistency models, deployment, and scalability.
Refactor scattered permission checks into a centralized service layer, add Next.js middleware guards, and build a defense-in-depth authorization architecture.
Build a type-safe RBAC system with TypeScript, create a unified can() function, synchronize permissions across UI and backend, and understand when RBAC reaches its limits.
Build an ABAC policy engine in TypeScript with the builder pattern, conditional permissions, and type-safe policy evaluation that replaces RBAC's limitations.
Extend ABAC with environment-based rules, field-level read and write permissions, and automatic database query filtering that eliminates duplicate permission logic.
Add multi-tenant isolation to your permission system, evaluate CASL as a library alternative, and use decision frameworks to choose the right authorization architecture.
Authentication vs authorization, common permission pitfalls, the fail-closed principle, and the goals every permission system should meet.
Why production teams replace broad MCP access with scoped API proxies. Covers Atlassian (Jira/Confluence), Google Workspace, and Notion with FastAPI proxy, CLI wrapper, and n8n examples.
A practical guide to designing and implementing AWS Control Tower multi-account strategy covering OU structure, SCPs, RCPs, Account Factory for Terraform, IAM Identity Center, and centralized security architecture.
A practical guide to building an org-level shared GitHub Actions platform covering architecture decisions, security governance, adoption strategy, and the 7 biggest mistakes we made along the way.
Enterprise-grade patterns for Model Context Protocol implementations including tool composition, multi-agent orchestration, role-based access control, and production observability.
A comprehensive technical guide to building production-grade prompt engineering systems, covering systematic design, security, observability, and cost optimization for enterprise LLM applications.
A comprehensive technical guide to Amazon Cognito's advanced features including custom authentication flows, federation patterns, multi-tenancy architectures, migration strategies, and production-grade security implementation.
A comprehensive technical guide comparing AWS Secrets Manager and Systems Manager Parameter Store, demonstrating when to use each service with real-world implementation patterns.
A comprehensive guide to Mozilla SOPS for managing encrypted secrets in Git repositories. Learn age encryption, AWS CDK patterns, AWS Lambda integration, and production-ready security strategies for serverless workflows.
A comprehensive guide to securing AI agents in production with AWS Bedrock Guardrails, defense-in-depth strategies, and practical implementation patterns for preventing prompt injection, tool misuse, and multi-agent attacks.
Learn how to build, secure, and deploy custom Model Context Protocol servers for your organization's internal systems with TypeScript, including authentication, monitoring, and Kubernetes deployment.
Learn how to implement secure cross-account event distribution using Amazon SNS and SQS. Covers IAM policies, KMS encryption, AWS CDK implementation, and common pitfalls from real-world deployments.
A practical glossary of essential networking concepts for developers - from protocols and DNS to debugging tools and security basics.
A practical guide to setting up a secure, affordable private server using VPS, Dokploy for deployments, and Cloudflared tunnels for secure access without exposing ports
Practical implementation guide for AI developer tools covering pilot programs, security frameworks, quality metrics, and real production patterns from enterprise deployments.
A comprehensive security reference with implementation context, lessons learned, and practical guidance from production systems.
Working with authentication systems across various industries has revealed that one-size-fits-all authentication is a myth. Each business domain has unique requirements that dramatically shape your auth architecture choices.
A guide to implementing AI-assisted code reviews based on real enterprise experience. Learn what AI catches that humans miss, where humans still excel, and how to build effective human-AI collaboration in code review processes.
Implementing custom domains, bulk operations, URL expiration, and comprehensive security measures. Defense-in-depth protection strategies for production link shortener services.
Real-world comparison of Auth0, Firebase Auth, Supabase Auth, AWS Cognito, and custom solutions. When to use each, cost analysis, and the debugging nightmares that taught me everything.
Real-world implementation of Auth0 multi-audience authentication across micro frontends, token management strategies, and silent authentication in React Native with WebView-based micro frontends
Implement robust authentication with Cognito, API Gateway authorizers, and fine-grained IAM policies when migrating from Serverless Framework to AWS CDK.