Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Fahim Farook

WAF vs. Application Layer for Bot Mitigation

Posted on April 28, 2024 by Fahim Farook

In a layered enterprise security architecture with a Web Application Firewall (WAF) deployed in the DMZ, should there be shared responsibility between the WAF and application layer/ microservices for mitigations the WAF supports, specifica… Continue reading WAF vs. Application Layer for Bot Mitigation→

Posted in API, CAPTCHA, waf, web-application | Tagged fingerprinting

RBAC for system to system access

Posted on April 14, 2023 by Fahim Farook

An organisations has multiple service tiers. One of the services in a core tier exposes APIs to the tier above. The core tier services do RBAC, consequently an end customer token is required in order to access their APIs.

There are 2 cat… Continue reading RBAC for system to system access→

Posted in authentication, Authorization, privilege escalation, RBAC, system-compromise

Authorise access to hierarchical data

Posted on August 29, 2021 by Fahim Farook

Consider a scenario in which you offer service access based on a hierarchy of authority. i.e., a HEAD can register his subordinates. The authenticated HEAD has the previledge to read and update data from all of his subordinates. Is there a… Continue reading Authorise access to hierarchical data→

Posted in Authorization, encryption, oauth2, privilege escalation, privilege-separation

Strategies for segregating anonymous and secure access to APIs

Posted on August 29, 2021 by Fahim Farook

Traditionally, we used either path-based access control or a separate DNS for public and private content segregation. In the modern era of standard-based auth, what are the best auth strategies for segregating anonymous and secure access t… Continue reading Strategies for segregating anonymous and secure access to APIs→

Posted in API, authentication, Authorization, oauth2

Harden against privilege escalation in Microservices

Posted on October 21, 2018 by Fahim Farook

Please consider the following scenario.

The system has a set of business owners (i.e. users of the system)
Each business owner is mapped to a set of customers
The business owners login to the system in order to manage their… Continue reading Harden against privilege escalation in Microservices→

Posted in encryption, privilege escalation, session management

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions April 29, 2026
  • Ubuntu’s AI Plans Have Linux Users Looking For a ‘Kill Switch’ April 29, 2026
  • Eero Signal keeps your business online during internet outages April 29, 2026
  • Qualcomm Revenues Decline 3 Percent to $10.6 Billion April 29, 2026
  • Amazon Revenues Up 17 Percent to $181.5 Billion April 29, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up