Skip to main content

Ravi Soni's blog

Securing Application With Zero Trust Architecture

July 9, 2023July 9, 2023 Ravi Soni Security, Zero Trust Architecture
View Fullscreen
ABAC OWASP Top 10 Principle of least privilege RBAC Secure by Default Secure by Design

Post navigation

Manage AWS Account Using IAM Identity Center or AWS Single Sign On
Preventing Cyber Attacks by Securing software supply chain using Software Bill of Material
  • AWS
  • AWS SSO
  • CDK
  • CI/CD
  • CodeArtifact
  • CodeCommit
  • Container
  • DataPrepper
  • DepencencyTrack
  • DevOps
  • ECR
  • EKS
  • IaC
  • IAM
  • IAM Identity Center
  • Kubernetes
  • Maven
  • Microservice
  • Observability
  • Open Source
  • OpenSearch
  • OpenTelementry
  • OWASP
  • SBOM
  • Security
  • SLSA
  • Software Bill of Material
  • Supply-chain Levels for Software Artifacts
  • Zero Trust Architecture
  • AWS UG Vadodara Meetup AWS EKS Overview
  • AWS UG Vadodara meetup Maven Zero to Hero with AWS CodeCommit CodeArtifact ECR OWASP Dependency Track
  • ACD Vadodara 2022 Microservices Observability with AWS OpenSearch
  • Infrastructure as Code using AWS CDK
  • Maven Zero to Hero with AWS CodeCommit CodeArtifact ECR OWASP Dependency Track

ABAC AWS AWS ECR AWS SSO CodeArtifact CodeCommit CycloneDX Dependency Track House Executive order 14028 IAM IAM Identity Center OWASP OWASP Top 10 Principle of least privilege RBAC SBOM Secure by Default Secure by Design SLSA Software Bill of Material SPDX SSO

  • LinkedIn
  • Github
sparkling Theme by Colorlib Powered by WordPress