Most of times we usually have a system that directly accesses an API that is primarily connected to a database. This logic has seemed to flourish for a while until attacks incre