Overview In this blog post, we are going to talk about what is Bastion Host and why do we need one. Afterward, we are going to deploy a proof of concept using AWS CloudFormation. Bastion Who? Although toil is highly discouraged, sometimes we need to ssh into an instance in order to do some kind of debugging. As a result, we need to expose tha... Read more 20 Apr 2020 - 4 minute read
In this post we discuss about some components that every API should have in order to not build a Completely Ridiculous API (A.k.a crAPI). You cannot longer afford to build crAPI ones Is no secret that APIs are becoming more popular because of initiatives such as Open Banking (PSD2) and IoT. This means that data is being exposed, and while so... Read more 12 Mar 2020 - 10 minute read
Photo by Thomas AE on Unsplash This post covers an overview on how the OAuth 2.0 protocol works and a practical example in golang in order to apply and better understand it’s flow. Why OAuth? Imagine that Alice just got the car of her dreams. To celebrate, she decides to go out to eat in a fancy restaurant and there is a valet parking ser... Read more 23 Sep 2019 - 6 minute read
Photo by Matthew Brodeur on Unsplash This blog post exemplifies and covers how a password storage should (or shouldn’t) be designed. Data Breaches are Everywhere Nowadays is not uncommon to read about a data breach. These incidents happen everyday and there is no sign that they will stop any time soon. Personal Identifiable Information (P... Read more 20 Aug 2019 - 8 minute read
Photo by tian kuan on Unsplash This post covers: The continuation of the first post of this series How Continuous Delivery integrates with Continuous Integration How to deploy the latest version of our application to AWS using Elastic Beanstalk Continuous Delivery In the previous post we focused on the setup of the Continuous Int... Read more 03 Jun 2019 - 8 minute read