Popis: |
The robustness and reliability of a software application is heavily dependent on the security of the information provided to the customers and other stakeholders. Even though different access control strategies provide first-level defenses to user data at the application level, we should equally emphasize on securing all logical and infrastructure layers, especially persistence stores, from malicious attacks that can breach the sensitive data and infrastructure configuration. Securing application and infrastructure is achieved many ways, such as managing user identities through authentication and authorization protocols, enhancing server security through strong firewalls, securing configuration information at centralized vaults, etc. |