Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]
Category: Uncategorized
We’ll be back next week…
Part I of II – Exploring the Digital Sovereignty narrative Motivation and authority on the matter For 3 decades I have been into Enterprise IT, designing, implementing and maintaining solutions at various layers of the “Digital Stack”. I did so always with a full life cycle perspective in mind and have lived and learned through […]