GeekCoding101

  • Home
  • GenAI
    • Daily AI Insights
    • Machine Learning
    • Transformer
    • Azure AI
  • DevOps
    • Kubernetes
    • Terraform
  • Tech
    • CyberSec
    • System Design
    • Coding Notes
  • About
  • Contact
system design
CyberSec

Secure by Design Part 1: STRIDE Threat Modeling Explained

Intro: Why Every App Needs Threat Modeling And Why STRIDE I’ve been meaning to write this post for a long time. Not because STRIDE Threat Modeling are the hottest buzzwords in cybersecurity—they aren’t. And not because threat modeling is some shiny new technique—it’s not. But because if you’re building or defending any system—especially something as deceptively simple as a chat app—threat modeling is non-negotiable. Whether you're knee-deep in SecOps, defining IAM policies, tuning your SIEM, or crafting detection logic, you’ve got one mission: protect the stuff that matters. That means user data, privacy, service uptime, and reputation and so on. And if we don't design with threats in mind, we're just building breach bait with good intentions. So why STRIDE? Because STRIDE gives us a practical lens to view risk before the attacker does. Instead of reacting to CVEs or chasing zero-days, STRIDE helps you think like a malicious actor while you’re still sketching your architecture in a whiteboard session or writing that controller code. In this post, I am going to use STRIDE threat modeling to walk through a seemingly simple application—a chat app—and uncover the kinds of security holes that quietly turn into breach reports. You’ll see just how quickly things go sideways when we forget to ask, “What could go wrong here?” But first, let's talk about the app we're modeling. Our Target: A Chat App Let’s keep it humble. No machine learning, no blockchain, no AI buzzwords glued onto CRUD. Just a straightforward web-based chat application. Here’s what it does: User Registration: Email + password Login System:…

June 2, 2025 0comments 28hotness 0likes Geekcoding101 Read all
System Design

A 12 Factor Crash Course in Python: Build Clean, Scalable FastAPI Apps the Right Way

Intro: Building Apps That Don’t Suck in Production Let’s be honest—plenty of apps “work on my machine” but self-destruct the moment they meet the real world. Configs hardcoded, logs missing, environments confused, and deployments that feel like an escape room puzzle. If you want your service to thrive in production (and not become an ops horror story), you need a design philosophy that enforces clean separation, modularity, and resilience. That's where the 12 Factor App methodology comes in. In this post, we’re going to break down each of the 12 Factor using a Python/FastAPI related stack—and walk through how to get them right. 🧱 The Twelve Factor — Python Style Let’s take each principle, one by one. Think of it as a devops dojo, with Python as your katana. Codebase: One codebase tracked in revision control, many deploys 12 Factor App: Single source of truth, version-controlled, no Franken-repos. 📌 In Python: One Git repo per service. Don't share code across projects via copy-paste. Use internal packages or shared libraries (published to private PyPI or via Git submodules). ✅ Best Practice: /fastapi-12factor-app ├── app/ │ ├── api/ │ ├── core/ │ ├── models/ │ └── main.py ├── tests/ ├── Dockerfile ├── pyproject.toml ├── README.md └── .env Dependencies: Explicitly declare and isolate dependencies 12 Factor App: No implicit magic. Use virtualenvs and lock your deps. 📌 In Python: Use pyproject.toml and a tool like Poetry or pip-tools. ✅ Example pyproject.toml: [tool.poetry.dependencies] python = "^3.12" fastapi = "^0.110.0" uvicorn = "^0.29.0" sqlalchemy = "^2.0" pydantic = "^2.6" python-dotenv = "^1.0" 🔒 Lock it…

May 11, 2025 0comments 279hotness 0likes Geekcoding101 Read all
Newest Hotest Random
Newest Hotest Random
Secure by Design Part 1: STRIDE Threat Modeling Explained Kubernetes Control Plane Components Explained A 12 Factor Crash Course in Python: Build Clean, Scalable FastAPI Apps the Right Way Golang Range Loop Reference - Why Your Loop Keeps Giving You the Same Pointer (and How to Fix It) Terraform Associate Exam: A Powerful Guide about How to Prepare It Terraform Meta Arguments Unlocked: Practical Patterns for Clean Infrastructure Code
A 12 Factor Crash Course in Python: Build Clean, Scalable FastAPI Apps the Right WayKubernetes Control Plane Components ExplainedSecure by Design Part 1: STRIDE Threat Modeling Explained
Empower Your AI Journey: Foundation Models Explained Mastering Multiple Features & Vectorization: Supervised Machine Learning – Day 4 and 5 Transformers Demystified - Day 2 - Unlocking the Genius of Self-Attention and AI's Greatest Breakthrough Master Learning Rate and Feature Engineering: Supervised Machine Learning – Day 8 Tmux Notes Mastering Openssl Command and NSS Database Management
Newest comment
Tag aggregation
Supervised Machine Learning notes Daily.AI.Insight Machine Learning AI Transformer security cybersecurity

COPYRIGHT © 2024 GeekCoding101. ALL RIGHTS RESERVED.

Theme Kratos Made By Seaton Jiang