Architecture of Business: Architectural Governance

Part 1. Architectural Governance: What and Why A concept of an Architecture of Business organisation (AoB) includes four fundamental artefacts, one of which is an Architectural Governance (AG). The Architecture of Business’s AG is defined as a set of principles, policies and procedures or activities, by which The AG is designed in compliance with existing …

#Code of #DevOps #Practice

Code of DevOps Practice is an open proposal for organising creative work of DevOps in modern enterprise. The document includes: subject, cause, values, pillars and principles of the DevOps development as well as some best practice recommendations and a list of referred articles.

#Microservice #Protection based on the principle of #Zero #Trust

The task addressed in the article is about protecting Microservice’s functionality and resources in the inter-Microservice interactions. Known techniques like OpenID Connects, JWT and OAuth2 were reviewed from the perspective of Microservice interactions. It has been found that these techniques cannot be applied as-is to the Microservices either because unanswered questions to them or because of doubtful trustfulness of related workflows.
The article proposes two protective methods for Microservice (or service) that have sensitive functionality and/or resources. While the Basic Protection Method is just a classic identity verification and following access permission control, the method does not require single centralised Identity and Permission Authorities. The latter can be distributed as needed following the distribution of Microservice-based applications. The Closed Optimised Protection Method replaces Identity and Permission Authorities with Dependency Catalogue Service per application and provides full protection with performance comparable with OpenID-JWT/OAuth2.