Jyotiprakash Mishrablog.jyotiprakash.org·Dec 18, 2024Packages, Nested Classes, and Access Control in JavaAs projects grow in size and complexity, organizing code becomes crucial for maintainability and readability. Imagine working on a project with hundreds of classes — having all these classes in a single folder would lead to chaos. Packages provide a ...28 readspackages in java
Devapraveendevpishon.hashnode.dev·Dec 14, 2024Streamline Role-Based Access Control with Spatie Laravel PermissionIn today's application development landscape, Role-Based Access Control (RBAC) has become a standard feature in most modern applications. If you're a Laravel developer, implementing RBAC is straightforward, thanks to the Spatie Permission package. Th...27 readsSpatiePermission
Karan Datwanibackpackforlaravel.hashnode.dev·Oct 13, 2024Backpack - Configure User Access Control and Permissions in 10 minutesHey folks! So, picture this: you're crafting your admin panel and the need for proper access control hits you. Admin panels without roles and permissions are like a party without bouncers – chaos waiting to happen. It's like giving everyone backstage...Laravel
Chioma Ibeakanmachiomaibeakanma.hashnode.dev·Sep 7, 2024Unauthorized Privilege Escalation Vulnerability via Role ManipulationPrivilege escalation vulnerabilities pose a serious threat in many applications, allowing unauthorized users to gain access to higher-level permissions. One such vulnerability is "Unauthorized Privilege Escalation via Role Manipulation." This issue a...43 readsVulnerabilities with Chioma Ibeakanmarole-based-access-control
Vanessa VillaforPangea Blogpangea.cloud·Sep 4, 2024RBAC vs ReBAC vs ABAC: Comparison and Guide on how to get startedWhat is authorization (AuthZ)? Authorization is a cornerstone of enterprise security. It dictates who can access specific resources, what actions they can perform, when, and the authorization logic can be as rigorous as to include attributes such as ...294 readsauthorization
Aniket Kurkuteaniket-kurkute.hashnode.dev·Aug 24, 2024Kubernetes RBACRole-Based Access Control (RBAC) is a way in which we can regulate the access to a resource, based on the roles assigned to users, and groups in the organization. The RBAC API has 4 kinds of k8s objects: Role ClusterRole RoleBinding ClusterRoleBi...#ClusterManagement
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 10, 2024Prisma Cloud: Your Ulimate Tool for Securing Multi-Cloud EnvironmentsAs cloud environments grow in complexity, the need for a unified, robust security platform becomes paramount. Prisma Cloud by Palo Alto Networks stands out as a comprehensive solution designed to secure multi-cloud infrastructures across AWS, GCP, ...1 likeprisma cloud
Foluso Ogunsakinnotonprem.hashnode.dev·Jul 29, 2024Navigating NACLs and Security Groups for Session Manager Connectivity in AWSI frequently create and manage EC2 instances in AWS. While there are multiple ways to access these instances, connecting via AWS Systems Manager (SSM) Session Manager is my preferred method for its secure seamlessness. However, setting up the session...32 likes·76 readsnetworking
Rakshita Belwalbelwalrakshita08.hashnode.dev·Jul 22, 2024DAY 6: Understanding Access Control Lists (ACL's) and Special File Permissions in LinuxWhat is ACL? Access control list (ACL) provides an additional, more flexible permission mechanism for file systems. ACLs allow you to define different permissions for different users or groups beyond the standard owner/group/others model. Using 'getf...#90daysofdevops
Sahil Mhatreequinox.hashnode.dev·Jul 14, 2024A Guide to Linux Permissions and Advanced ACLUnderstanding File Permissions: Creating and Viewing File Details Create a Simple File: Use touch filename to create a file. View File Details: Run ls -l to see detailed information about files, including permissions. File Permission Categori...1 likeDevops