The previous section was more focused on the general rules of application security to consider while creating an architecture design, but the question is: How do we apply these rules to make the application secure during implementation? There are various tools and technologies available for each layer of your application to make it secure.
In this section, you will learn in detail about the multiple technology choices to apply in the area of user management and protection of the web, infrastructure, and data of your application. Let's start with the first area, user identity and access management.