• Let's make Cloud ☁️
  • Posts
  • Let's make Cloud #41: Implementing GitFlow with Amazon CodeCatalyst, AMBERSQUID Cloud-Native Cryptojacking Operation, Authentication Strategies in Microfrontends

Let's make Cloud #41: Implementing GitFlow with Amazon CodeCatalyst, AMBERSQUID Cloud-Native Cryptojacking Operation, Authentication Strategies in Microfrontends

Implementing GitFlow with Amazon CodeCatalyst, AMBERSQUID Cloud-Native Cryptojacking Operation, Authentication Strategies in Microfrontends

Hello CloudMakers!

Today we shall see:

  • Implementing GitFlow with Amazon CodeCatalyst

  • AMBERSQUID Cloud-Native Cryptojacking Operation

  • Authentication Strategies in Microfrontends

Enjoy!

Implementing GitFlow with Amazon CodeCatalyst

CodeCatalyst allows teams to easily implement their chosen branching strategies, including popular models like GitFlow or their own unique approach. It offers Workflows to help design the development process and deploy to various environments. This article discusses the use of multiple CodeCatalyst Workflows to enhance team collaboration and effectively manage changes in the codebase. It introduces different branching models like GitFlow, GitHub flow, and trunk-based development, each with their distinct project and release management methods. They outline how to implement GitFlow in CodeCatalyst, using specific branches for different functions, each deployed to its respective environment.

AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

The Sysdig Threat Research Team has unveiled an attack called AMBERSQUID, which smartly uses rarely watched AWS services, leading to significant unnoticed losses for victims. Despite its stealthiness, the insights we, as technicians, gain from reading about these attacks are invaluable. They offer us a golden opportunity to continuously learn and adapt. These detailed reports shed light on new vulnerabilities and tactics, keeping us on our toes and helping to enhance our defensive strategies against such innovative attacks. The knowledge we garner from these discoveries is essential in fortifying our systems and staying ahead in the security game.

Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

The transition towards a more modular approach is evident in web development, marked by the adoption of Microservices and Microfrontends. This evolution promotes independence and rapid value delivery. However, this change isn't devoid of complications, notably in the realm of authentication. Microfrontends, despite their myriad advantages, introduce complexities in state sharing. The article takes a deep dive into these intricacies, examining two pivotal strategies for managing authentication in a microfrontend setting: Backend for Frontend (BFF) Authorization and Frontend Side Silent Login. The exploration of these methods highlights the significance of understanding and navigating the multifaceted landscape of modern web development.

Thank you for reading my newsletter!

If you liked it, please invite your friends to subscribe!

If you were forwarded this newsletter and liked it, you can subscribe for free here:

Have you read an article you liked and want to share it? Send it to me and you might see it published in this newsletter!

Interested in old issues? You can find them here!