System Design / Cloud / Code

Engineering thoughts,
written in code.

Real-world system design, backend patterns, and practical guides for engineers who build at scale.

Browse all posts
Filter
01
Penetration Testing Basics for Developers
Cloud
Cloud

Penetration Testing Basics for Developers

A developer-friendly introduction to penetration testing. Covers reconnaissance, common attack vectors, tools (Burp Suite, nmap, OWASP ZAP), writing security test cases, and how to think like an attacker without being one.

02
OWASP Top 10 for Cloud Applications
Cloud
Cloud

OWASP Top 10 for Cloud Applications

The OWASP Top 10 through the lens of cloud-native applications. Covers how each vulnerability manifests in AWS/GCP/Azure environments, with cloud-specific attack vectors and defenses for serverless, containers, and microservices.

03
CloudTrail and Security Observability
Cloud
Cloud

CloudTrail and Security Observability

How to build security observability in AWS using CloudTrail, CloudWatch, and Athena. Covers audit logging, anomaly detection, SIEM integration, and building custom security dashboards.

04
Auto-Remediation with Lambda — Fix Security Issues Automatically
Cloud
Cloud

Auto-Remediation with Lambda — Fix Security Issues Automatically

Build automated security remediation using AWS Lambda, EventBridge, and Config Rules. Auto-close open security groups, revoke public S3 buckets, and enforce tagging — with real Lambda code examples.

05
Security Ticketing and Incident Response
Cloud
Cloud

Security Ticketing and Incident Response

Build an effective security incident response process. Covers incident classification, runbooks, ticketing workflows, communication templates, and post-incident reviews — with practical examples for cloud environments.

06
AWS IAM Security — Beyond Basic Roles
Cloud
Cloud

AWS IAM Security — Beyond Basic Roles

Deep dive into AWS IAM security best practices. Covers permission boundaries, SCPs, assume role chains, session policies, and how to audit IAM for least-privilege access in production environments.

07
Container Security — Docker and Kubernetes Hardening
Cloud
Cloud

Container Security — Docker and Kubernetes Hardening

A hands-on guide to securing Docker containers and Kubernetes clusters. Covers image scanning, rootless containers, network policies, pod security standards, and runtime threat detection.

08
Supply Chain Security — Protecting Your Software Pipeline
Cloud
Cloud

Supply Chain Security — Protecting Your Software Pipeline

A comprehensive guide to software supply chain security. Covers SLSA framework, dependency pinning, reproducible builds, provenance verification, and lessons from real-world supply chain attacks (SolarWinds, Log4Shell, xz).

09
Compliance Automation — SOC2 and ISO 27001
Cloud
Cloud

Compliance Automation — SOC2 and ISO 27001

Automate compliance for SOC2 and ISO 27001 using infrastructure as code, continuous monitoring, and policy-as-code tools. Covers AWS Config, Open Policy Agent, and building evidence collection pipelines.

10
Dependency Vulnerability Detection at Scale
Cloud
Cloud

Dependency Vulnerability Detection at Scale

How to detect and manage vulnerable dependencies across hundreds of repositories. Covers SCA tools (Snyk, Dependabot, Trivy), SBOM generation, vulnerability prioritization, and building an automated remediation pipeline.

11
Code Signing — Why and How
Cloud
Cloud

Code Signing — Why and How

Understand why code signing matters and how to implement it. Covers signing Git commits, Docker images (cosign/Notary), npm packages, and building a chain of trust from developer to production.

12
Security Mindset for Engineers — Think Like an Attacker
Cloud
Cloud

Security Mindset for Engineers — Think Like an Attacker

Learn how to adopt a security-first mindset as a software engineer. Covers threat modeling, attack surfaces, defense in depth, and the principle of least privilege — with real-world examples from cloud environments.

13
Secrets Management — Vault, SSM, and Secrets Manager
Cloud
Cloud

Secrets Management — Vault, SSM, and Secrets Manager

A practical guide to secrets management in cloud environments. Compare HashiCorp Vault, AWS SSM Parameter Store, and AWS Secrets Manager — with implementation patterns, rotation strategies, and common pitfalls.

14
Building a Security Pipeline — DevSecOps in Practice
Cloud
Cloud

Building a Security Pipeline — DevSecOps in Practice

How to build a complete security pipeline integrated into your CI/CD. Covers SAST, DAST, SCA, secret scanning, infrastructure scanning, and how to shift security left without slowing down developers.

15
Build a Cloud Security Scanner — Hands-On Project
Cloud
Cloud

Build a Cloud Security Scanner — Hands-On Project

Build a real cloud security scanner from scratch using Python and AWS APIs. Scan for open security groups, public S3 buckets, unencrypted volumes, overly permissive IAM policies, and generate a security report.

16
Database Integration — PostgreSQL with Node.js
nodejs
nodejs

Database Integration — PostgreSQL with Node.js

Connect Node.js to PostgreSQL using pg, Knex.js, and Prisma ORM. Learn connection pooling, migrations, transactions, and query optimization

17
WebSockets with Socket.io in Node.js
nodejs
nodejs

WebSockets with Socket.io in Node.js

Build real-time applications with WebSockets and Socket.io in Node.js — rooms, namespaces, scaling with Redis adapter, and handling reconnection

18
Error Handling and Logging in Production Node.js
nodejs
nodejs

Error Handling and Logging in Production Node.js

Build robust error handling and structured logging for production Node.js apps using Winston, Pino, custom error classes, and centralized error middleware

19
Redis — Caching, Sessions, Pub/Sub in Node.js
nodejs
nodejs

Redis — Caching, Sessions, Pub/Sub in Node.js

Use Redis with Node.js for caching, session storage, pub/sub messaging, rate limiting, and distributed locks using ioredis

20
Testing Node.js — Unit, Integration, and E2E
nodejs
nodejs

Testing Node.js — Unit, Integration, and E2E

Comprehensive testing strategies for Node.js applications with Jest, Supertest, and Testcontainers — from unit tests to end-to-end API testing

21
Authentication — JWT, Sessions, OAuth in Node.js
nodejs
nodejs

Authentication — JWT, Sessions, OAuth in Node.js

Implement secure authentication in Node.js using JWT tokens, server-side sessions, and OAuth 2.0 with Passport.js and best security practices

22
Real Project — Build a Production Node.js API
nodejs
nodejs

Real Project — Build a Production Node.js API

Build a complete production-ready REST API with Node.js, Express, PostgreSQL, Redis, JWT auth, testing, Docker, and CI/CD — putting it all together

23
MongoDB with Mongoose — Patterns and Pitfalls
nodejs
nodejs

MongoDB with Mongoose — Patterns and Pitfalls

Master MongoDB with Mongoose in Node.js — schema design, indexing strategies, population, aggregation pipelines, and common anti-patterns to avoid

24
File Uploads and S3 Integration in Node.js
nodejs
nodejs

File Uploads and S3 Integration in Node.js

Handle file uploads in Node.js with Multer, stream large files to AWS S3, generate presigned URLs, and implement multipart uploads for large files

25
Message Queues with RabbitMQ and SQS in Node.js
nodejs
nodejs

Message Queues with RabbitMQ and SQS in Node.js

Implement reliable message queuing in Node.js with RabbitMQ (amqplib) and AWS SQS. Learn exchange types, dead letter queues, retry patterns, and guaranteed delivery

26
Performance Optimization and Profiling in Node.js
nodejs
nodejs

Performance Optimization and Profiling in Node.js

Profile and optimize Node.js applications — find memory leaks, reduce event loop lag, use worker threads, cluster mode, and caching strategies

27
Building REST APIs with Express and Nest.js
nodejs
nodejs

Building REST APIs with Express and Nest.js

A comprehensive guide to building production-ready REST APIs with Express.js and Nest.js, covering routing, middleware, validation, and best practices

28
Deploying Node.js to AWS
nodejs
nodejs

Deploying Node.js to AWS

Deploy Node.js applications to AWS using ECS Fargate, Lambda, and Elastic Beanstalk — with CI/CD pipelines, auto-scaling, and monitoring

29
Docker and Containerization for Node.js
nodejs
nodejs

Docker and Containerization for Node.js

Containerize Node.js applications with Docker — multi-stage builds, Docker Compose for development, health checks, security best practices, and production optimization

30
Node.js Architecture — Event Loop Deep Dive
nodejs
nodejs

Node.js Architecture — Event Loop Deep Dive

Understand the Node.js event loop, its phases, microtasks vs macrotasks, and how non-blocking I/O actually works under the hood with libuv

31
Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More
tutorials
tutorials

Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More

A practical guide to building Claude Code custom skills for engineering workflows — automated code reviews, security scanning, test generation, commit hygiene, and CI integration with real skill definitions you can use today.

32
Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts
tutorials
tutorials

Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts

A practical guide to building an AI-powered voicebot for visitor check-in at offices and buildings — covering STT/TTS pipeline, LLM conversation design, error handling, fallback strategies, latency optimization, and the real-world problems nobody warns you about.

33
Server Security Best Practices — Complete Hardening Guide for Production Systems
security
security

Server Security Best Practices — Complete Hardening Guide for Production Systems

A comprehensive guide to server security best practices covering SSH hardening, firewall configuration, TLS setup, privilege escalation prevention, logging, automated patching, and incident response for production Linux servers.