Selecting technology for architectural security
The previous section focused on the general application security rules to consider while designing architecture. Still, the question is: How do we apply these rules to make the application secure during implementation? There are various tools and technologies available for each layer of your application to make it secure.
In this section, you will learn in detail about the multiple technology choices you have in the areas of user management and the protection of the web layer, infrastructure, and data of your application. Let’s start with the first area, user identity and access management.
User identity and access management
User identity and access management are vital parts of information security. This is because it’s best to ensure that only authenticated and authorized users can access your system resources in a defined manner.
User management could be a daunting task as your organization grows and...