paint-brush
The Basics of Secure Application Architectures - Separation, Configuration, and Accessby@victoria
844 reads
844 reads

The Basics of Secure Application Architectures - Separation, Configuration, and Access

by Victoria Drake6mOctober 3rd, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A starting point for building secure application architecture for busy developers is a good way to avoid security debt. The market seems to have made it more important to launch a usable product than a secure one. The prevailing attitude seems to be “we can do the security stuff later” is a bad way to build applications. Separated storage, customized configuration and controlled access and user scope are key to building secure applications. A complete picture of a fully-realized application’s security posture includes areas outside the scope of this post.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - The Basics of Secure Application Architectures - Separation, Configuration, and Access
Victoria Drake HackerNoon profile picture
Victoria Drake

Victoria Drake

@victoria

Webmaster at https://victoria.dev.

About @victoria
LEARN MORE ABOUT @VICTORIA'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Victoria Drake HackerNoon profile picture
Victoria Drake@victoria
Webmaster at https://victoria.dev.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Learnrepo