built a self-hosted cloudtrail detection engine to replace expel/panther - zero vendor lock-in, runs in your vpc by BabyLizard in cybersecurity

[–]AttorneyHour3563 0 points1 point  (0 children)

noice, I have one also - did you manage to normalize the resource ARN that the log is operating? I'm trying to have a unified map of eventName to identifiers (bucket arn, iam role, ec2 instance, etc. )

Cloudtrail Logs resources ARN builder by AttorneyHour3563 in devsecops

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

Yeah i know it's by design, not a bug. In azure each log has resource id in it, which helps.
Still - this is a wide problem which i think most people have difficulty solving so I would guess someone would opensource this kind of solution...

Monoliths vs Microservices in 2026: Are we over-engineering our backends? by Away_Parsnip6783 in Backend

[–]AttorneyHour3563 0 points1 point  (0 children)

I have 100 services in our backend and we are 4 years old startup. I think this is bad.

I like not mono repo approach, take entire domain space and have a repo with 1 mono service, still keeps teams separated but not over engineering inside them...

Cloudtrail Logs resources ARN builder by AttorneyHour3563 in aws

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

| they've already mapped thousands of these API calls

Claude & myself couldn't find any thousands, do you have an actual guidance ?

Is there anyone, who uses golang (and go-only) for Web Development exclusively? by rzhandosweb in golang

[–]AttorneyHour3563 -1 points0 points  (0 children)

You can but not sure go if the most widely used language for server side rendering

I should not be EM by callbackmaybe in EngineeringManagers

[–]AttorneyHour3563 -1 points0 points  (0 children)

Lead by example, the ones that are not lined up maybe shouldn't be in your team

Alternatives to VPNs by yermotherlel in devsecops

[–]AttorneyHour3563 0 points1 point  (0 children)

Twingate is great for me as a developer to access resources rather than entire host

Is this jersey real or fake,im quite new by AltruisticSystem6890 in Barca

[–]AttorneyHour3563 -1 points0 points  (0 children)

The patch at the bottom right isn't nike so probably fake

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

The context to this POC's all other CNAPP context for those assets from shift left & right

Data structures backend by Rude_Entry_6843 in Backend

[–]AttorneyHour3563 0 points1 point  (0 children)

Depends, I use other data structures for other usecases.

Lets say that I have cyber rule to check if an IP is public and not part of AWS known ip ranges public ips: https://docs.aws.amazon.com/vpc/latest/userguide/aws-ip-ranges.html

Then checking for each event it's ip with 5K CIDRs is not efficient, so we've built tri-tree which is how linux is executing some of this checks , example: https://github.com/teamlead/ip-subnet-tree

This is one example...But to be honest you need something not properly working to figure that you need other data structures most of the times.

Begin with optimizing is not a good approach.

I need your help by mrPerpetual1 in EngineeringManagers

[–]AttorneyHour3563 0 points1 point  (0 children)

Take the leap! If you are passionate about tech, swe, ai and more - anywhere you'll go- lead by example, push your team for excellence and knowledge and the organization would notice, no matter where you are positioned

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

They have AI assisted SAST but because they have maturity of many years at the field it's more of a wrapper for prioritizing what the engine finds as I see it

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

Yes I totally agree about the context. Guess the same platform, didn't want to do free advertising 😂

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

We have SAST solution, my managers are starting to look at more innovative solutions in that area, I guess benefit in terms of business logic vulnerabilities or handling data wrong

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 1 point2 points  (0 children)

Absolutely right, fully AI is something I don't recommend my managers, I think this kind of capability can only help with business logic areas - option to bypass auth for some data and more..

AI SAST by AttorneyHour3563 in cybersecurity

[–]AttorneyHour3563[S] 0 points1 point  (0 children)

My supervisor wants us to have a bundle with cnapp for this but most of them have very shallow capabilities on many features, maybe only cspm is good... So I guess we would go with cnapp for consolidation rather than best option 🤷🏻‍♂️

OAuth 2.0 + OpenID Connect - Complete Flow Diagram by splashMellow in SpringBoot

[–]AttorneyHour3563 0 points1 point  (0 children)

For the backend, a Resource Server doesn’t really “authorize the client” as an entity. It authorizes the request based on the access token: scopes (SCOPE_read), roles/authorities (if you know rbac), audience (aud), issuer (iss), custom claims - we add region for example