Skip to content

security

34 posts

HMAC: What It Is, How It Works, and When It Is the Wrong Tool

A grounded explainer for backend engineers: HMAC-SHA-256 for webhooks, signed URLs, and internal auth, with three-language code and the boundary where digital signatures take over.

securitycryptographyhmac+5
Set Up Claude as a PR Reviewer with the Official GitHub Action

A hardened, paste-ready setup for adding Anthropic's claude-code-action to a GitHub repo, with the security and cost knobs spelled out for production use.

claudegithub-actionscode-review+4
Zapier MCP as a Permission Control Layer: Taming Broad API Access for AI Agents

How Zapier MCP provides action-level whitelisting, credential isolation, and human-in-the-loop approval for AI agents. A managed alternative to custom scoped proxies for multi-app API governance.

mcpsecurityai-agents+4
AWS Cognito + Verified Permissions for SaaS Authorization4/4

A deep dive into building SaaS authorization with AWS Cognito and Verified Permissions. Covers Cedar policy language, multi-tenant patterns, JWT token flow, cost analysis, and common mistakes with TypeScript examples.

authorizationawscognito+4
External Authorization Management Systems: Choosing the Right Platform for Your Architecture3/4

A vendor-neutral evaluation of external authorization platforms including AWS Verified Permissions, SpiceDB, OpenFGA, Cerbos, and OPA. Covers architecture patterns, cost analysis, and a decision framework for engineering teams.

authorizationsecurityarchitecture+5
Cedar vs Rego vs OpenFGA: Policy Language Comparison2/4

A deep technical comparison of Cedar, Rego, OpenFGA DSL, and Cerbos YAML/CEL policy languages. Covers syntax, performance benchmarks, formal verification, tooling, and integration patterns with TypeScript examples for each language.

authorizationsecurityarchitecture+3
SpiceDB vs Auth0 FGA: Relationship-Based Authorization Compared1/4

A deep technical comparison of SpiceDB and Auth0 FGA (OpenFGA) -- two Zanzibar-inspired authorization systems with different trade-offs in schema design, consistency models, deployment, and scalability.

authorizationsecurityarchitecture+3
Centralizing Authorization with a Service Layer6/6

Refactor scattered permission checks into a centralized service layer, add Next.js middleware guards, and build a defense-in-depth authorization architecture.

typescriptnextjsauthorization+2
Role-Based Access Control: Type-Safe RBAC in TypeScript5/6

Build a type-safe RBAC system with TypeScript, create a unified can() function, synchronize permissions across UI and backend, and understand when RBAC reaches its limits.

typescriptnextjsauthorization+3
Attribute-Based Access Control: Building a Policy Engine4/6

Build an ABAC policy engine in TypeScript with the builder pattern, conditional permissions, and type-safe policy evaluation that replaces RBAC's limitations.

typescriptnextjsauthorization+3
Advanced ABAC: Field-Level Permissions and DB Integration3/6

Extend ABAC with environment-based rules, field-level read and write permissions, and automatic database query filtering that eliminates duplicate permission logic.

typescriptnextjsauthorization+3
Multi-Tenancy, Permission Libraries, and Architectural Decisions2/6

Add multi-tenant isolation to your permission system, evaluate CASL as a library alternative, and use decision frameworks to choose the right authorization architecture.

typescriptnextjsauthorization+5
Authorization Fundamentals and Why Permissions Break1/6

Authentication vs authorization, common permission pitfalls, the fail-closed principle, and the goals every permission system should meet.

typescriptnextjsauthorization+2
Skip the MCP Layer: Scoped API Access for Production AI Agents

Why production teams replace broad MCP access with scoped API proxies. Covers Atlassian (Jira/Confluence), Google Workspace, and Notion with FastAPI proxy, CLI wrapper, and n8n examples.

mcpapi-designpython+5
AWS Control Tower Multi-Account Strategy: From Landing Zone to Enterprise Governance

A practical guide to designing and implementing AWS Control Tower multi-account strategy covering OU structure, SCPs, RCPs, Account Factory for Terraform, IAM Identity Center, and centralized security architecture.

awsaws-control-towermulti-account+6
Building a Scalable GitHub Actions Platform for a Large-Scale Microservices Architecture

A practical guide to building an org-level shared GitHub Actions platform covering architecture decisions, security governance, adoption strategy, and the 7 biggest mistakes we made along the way.

github-actionsci-cddevops+5
MCP Advanced Patterns: Skills, Workflows, Integration, and RBAC

Enterprise-grade patterns for Model Context Protocol implementations including tool composition, multi-agent orchestration, role-based access control, and production observability.

mcpai-integrationrbac+4
Prompt Engineering for Production Systems: A Systematic Engineering Approach

A comprehensive technical guide to building production-grade prompt engineering systems, covering systematic design, security, observability, and cost optimization for enterprise LLM applications.

prompt-engineeringllmai-development+6
Amazon Cognito Deep Dive: Beyond Basic Authentication

A comprehensive technical guide to Amazon Cognito's advanced features including custom authentication flows, federation patterns, multi-tenancy architectures, migration strategies, and production-grade security implementation.

awscognitoauthentication+7
AWS Secrets Manager & Parameter Store: Security Best Practices

A comprehensive technical guide comparing AWS Secrets Manager and Systems Manager Parameter Store, demonstrating when to use each service with real-world implementation patterns.

awssecrets-managerparameter-store+8
Mozilla SOPS: GitOps-Native Secret Encryption That Actually Works

A comprehensive guide to Mozilla SOPS for managing encrypted secrets in Git repositories. Learn age encryption, AWS CDK patterns, AWS Lambda integration, and production-ready security strategies for serverless workflows.

sopsgitopsterraform+9
AI Agent Security: Guardrails and Defense Patterns for Production Systems

A comprehensive guide to securing AI agents in production with AWS Bedrock Guardrails, defense-in-depth strategies, and practical implementation patterns for preventing prompt injection, tool misuse, and multi-agent attacks.

ai-agentsaws-bedrocksecurity+5
Building Custom MCP Servers: A Production-Ready Guide

Learn how to build, secure, and deploy custom Model Context Protocol servers for your organization's internal systems with TypeScript, including authentication, monitoring, and Kubernetes deployment.

typescriptmcpnodejs+5
SNS/SQS Cross-Account Fan-Out: Building Multi-Account Event Distribution in AWS

Learn how to implement secure cross-account event distribution using Amazon SNS and SQS. Covers IAM policies, KMS encryption, AWS CDK implementation, and common pitfalls from real-world deployments.

awsaws-snsaws-sqs+6
Network Fundamentals Every Software Developer Should Know

A practical glossary of essential networking concepts for developers - from protocols and DNS to debugging tools and security basics.

networkinghttptcp-ip+5
Cost-Effective Private Server Setup with VPS, Dokploy, and Cloudflared

A practical guide to setting up a secure, affordable private server using VPS, Dokploy for deployments, and Cloudflared tunnels for secure access without exposing ports

dockervpscloudflare+4
AI Developer Tools Part 2: Hands-On Implementation Guide - From Setup to Production1/1

Practical implementation guide for AI developer tools covering pilot programs, security frameworks, quality metrics, and real production patterns from enterprise deployments.

ai-toolsimplementationsecurity+4
The Security Glossary: 50+ Terms Every Dev Team Should Know

A comprehensive security reference with implementation context, lessons learned, and practical guidance from production systems.

securityauthenticationoauth2+9
Authentication & Authorization Strategies by Business Domain: When Banking Security Meets Social Media Chaos

Working with authentication systems across various industries has revealed that one-size-fits-all authentication is a myth. Each business domain has unique requirements that dramatically shape your auth architecture choices.

authenticationauthorizationsecurity+8
LLM Code Review: When AI Finds What Humans Miss

A guide to implementing AI-assisted code reviews based on real enterprise experience. Learn what AI catches that humans miss, where humans still excel, and how to build effective human-AI collaboration in code review processes.

ai-code-reviewgithubsecurity+7
AWS CDK Link Shortener Part 3: Advanced Features & Security1/1

Implementing custom domains, bulk operations, URL expiration, and comprehensive security measures. Defense-in-depth protection strategies for production link shortener services.

aws-cdklambdasecurity+6
Auth Providers for Mobile, Web, and API: A Complete Guide to Choosing the Right Solution

Real-world comparison of Auth0, Firebase Auth, Supabase Auth, AWS Cognito, and custom solutions. When to use each, cost analysis, and the debugging nightmares that taught me everything.

auth0cognitofirebase+2
Multi-Audience Auth0 Authentication in Micro Frontends: Token Management Patterns and Implementation

Real-world implementation of Auth0 multi-audience authentication across micro frontends, token management strategies, and silent authentication in React Native with WebView-based micro frontends

auth0jwtoauth+2
Migrating from Serverless Framework to AWS CDK: Part 5 - Authentication, Authorization, and IAM1/1

Implement robust authentication with Cognito, API Gateway authorizers, and fine-grained IAM policies when migrating from Serverless Framework to AWS CDK.

authorizationaws-cdkcognito+3