How to secure microservice applications with role-based access control? (7/7)

Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]

“This space intentionally left blank”

We’ll be back next week…

A Primer on Digital Sovereignty & Open Source

Part I of II – Exploring the Digital Sovereignty narrative Motivation and authority on the matter  For 3 decades I have been into Enterprise IT, designing, implementing and maintaining solutions at various layers of the “Digital Stack”. I did so always with a full life cycle perspective in mind and have lived and learned through […]