Aembit Launches out of Stealth
Aembit is launching from stealth today, and has three exciting announcements!
Welcome to the Aembit blog for DevOps, Security Pros, Software Developers, Cloud Architects, and Technology Managers.
Aembit is launching from stealth today, and has three exciting announcements!
Our latest release adds support for managing access to MySQL databases and query parameter injection for HTTP.
Video and transcript of a presentation and overview of Aembit (January 2023). Aembit helps customers manage, enforce, and audit access between...
This article describes how to use Terraform to configure AWS to periodically start an EC2 instance.
This article briefly describes SPIFFE and SPIRE and explains how Aembit differs from them.
TLS for Postgres is different than for web browsers and HTTP. This article describes issues we encountered developing Aembit's support for Postgres...
Our latest release adds support for Helm-based deployment, API Keys, and TLS to AWS RDS for PostgreSQL.
This article is a brief overview of some challenges with IaC. It's not a complete guide to IaC, but it will give you an idea of what to watch out for.
This article discusses some key differences between Aembit and secrets managers and how Aembit can provide a better access solution in most cases.
We are inviting all DevOps and Security teams to try Aembit. It's free to get started and entirely self-service. We’re here to help you along the way.
Workload Identity and Access Management basically means that you need to make sure authorized apps on one side of a request can access apps on the...
This article will help you understand how to authenticate a workload with the Microsoft Graph REST API using the OAuth 2.0 Client Credentials flow.
Choosing a programming language for a new project is a rigid architectural decision. This article discusses why we chose Rust for Aembit's...
How we use Docker Compose and Kubernetes to rapidly accelerate development workflows.
The idea of traffic steering is simple. Rather than sending it directly to its destination, we want to first send it to a proxy to inspect and modify...
What is Aembit, and what is Workload IAM? What's a workload, for that matter? Here we ask and answer these questions with a gentle introduction to...
Get notified when we post new content for DevOps, Security Pros, Software Developers, Cloud Architects, and Technology Managers.