Tag

Enterprise Security

0 views collected around this technical thread.

Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLDACEnterprise Security
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLBaiduDAC
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
Cloud Native Technology Community
Cloud Native Technology Community
Mar 21, 2023 · Information Security

2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers

The 2022 Cloud Native Security State Report reveals that while enterprises increased cloud usage by over 25% during the pandemic, many face security and compliance challenges, and highlights how strong security posture, DevSecOps integration, and automation dramatically reduce friction and boost operational efficiency.

Cloud AdoptionDevSecOpsEnterprise Security
0 likes · 6 min read
2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers
Architects Research Society
Architects Research Society
Nov 3, 2022 · Operations

Potential Costs of Shadow IT for Enterprises

Unapproved software, known as shadow IT, can impose hidden personnel, business, and technical expenses on organizations, and CIOs must identify, prevent, and mitigate these costs to maintain smooth IT operations and avoid legal, security, and productivity risks.

Cost ManagementEnterprise SecurityIT Operations
0 likes · 7 min read
Potential Costs of Shadow IT for Enterprises
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

Enterprise SecurityJWTOAuth2
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
AntTech
AntTech
Jun 21, 2022 · Information Security

Zero Trust Security Model and Technical Architecture for Ant Financial Office

This article examines the evolution from traditional perimeter‑based security to zero‑trust models, compares their advantages, presents industry case studies, and details Ant Financial’s integrated zero‑trust architecture—including SDP, IAM, and micro‑segmentation—along with implementation practices and future outlook.

Enterprise SecurityIAMMicro Segmentation
0 likes · 17 min read
Zero Trust Security Model and Technical Architecture for Ant Financial Office
58 Tech
58 Tech
Apr 28, 2022 · Information Security

Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System

The article presents a comprehensive case study of the Magic Butler system—a zero‑trust security management solution developed by 58 Group’s TEG department—detailing its business drivers, design principles, architecture, key technical features, deployment scale, and future outlook for enterprise network security.

Endpoint ManagementEnterprise SecurityNetwork Security
0 likes · 14 min read
Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System
Architecture Digest
Architecture Digest
Apr 14, 2022 · Information Security

Zero Trust Architecture: Concepts, Implementation Models, and Deployment Practices

This article provides a comprehensive overview of zero‑trust security, explaining its core principles, SDP‑based architecture, three main implementation models (application‑layer proxy, traffic‑layer proxy, and hybrid), various deployment scenarios, and practical guidance for enterprise adoption.

Enterprise SecurityNetwork SecuritySDP
0 likes · 13 min read
Zero Trust Architecture: Concepts, Implementation Models, and Deployment Practices
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Enterprise Securityinformation securitymanagement system
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
Efficient Ops
Efficient Ops
Jun 25, 2020 · Information Security

How Enterprise DevSecOps Transforms Security in Modern IT Operations

The article recaps the fourth Enterprise DevOps Empowerment conference, highlighting DevSecOps as the core theme, expert presentations from China Academy of Information and Communications Technology, Huatai Securities, and Tencent, and a detailed Q&A covering threat modeling, security automation, scanning practices, and operational integration.

DevSecOpsEnterprise SecurityIT Operations
0 likes · 15 min read
How Enterprise DevSecOps Transforms Security in Modern IT Operations
Youzan Coder
Youzan Coder
Dec 13, 2019 · Information Security

Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation

Boundary defense—protective measures at business and IT entry points such as firewalls, WAFs, and secure development lifecycles—provides early‑stage enterprises a clear perimeter through detection, response, protection, and policy, as illustrated by Youzan’s web‑gate WAF, SDL checkpoints, DNS monitoring, and automated security‑ticket processes, enabling a shift toward deeper, defense‑in‑depth strategies.

Enterprise SecuritySDLboundary defense
0 likes · 18 min read
Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation
Architects' Tech Alliance
Architects' Tech Alliance
May 15, 2017 · Information Security

Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps

This article provides an in‑depth analysis of ransomware, detailing its typical propagation methods, common intrusion techniques, C2 communication behaviors, the defensive chain across reconnaissance, deployment and persistence stages, and highlights current enterprise security gaps and comprehensive protection strategies.

C2 communicationEnterprise Securityinformation security
0 likes · 13 min read
Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps