Accept
This website is using cookies. More details
Blog

ARHS Spikeseed
cloud computing blog.

Our latest publications related to security

  • Charles Guebels

    Protect a CloudFront distribution with Cognito or BasicAuth

    Amazon CloudFront is a very useful service for exposing multiple origin types like ALB, custom domains or S3 buckets. However, CloudFront does not provide a direct way to restrict access...

    Read More
  • Gokdag Goktepe

    OAuth 2.0 Authorization Code Flow & AWS Cognito

    The previous article introduced the OAuth 2.0 protocol, highlighting distinctions between authentication and authorization. OAuth 2.0, an industry-standard protocol, was discussed in the context of cloud-native applications, addressing security concerns...

    Read More
  • Charles Guebels

    AWS European Sovereign Cloud

    Recently AWS announced that it was working on a European Sovereign Cloud, this is a good opportunity to discover a little more about what is hidden behind this term and...

    Read More
  • Dimitri Appriou

    Effective secrets management in AWS

    Today, secrets are used everywhere. Being the key to infrastructures and the data they are holding, a compromised secret can lead to security breaches of catastrophic proportions. Consequently, securing secrets...

    Read More
  • Gokdag Goktepe

    Introduction to OAuth 2.0 Protocol

    “It’s a dangerous business, Frodo, going out your door.”

    Read More
  • Yohan Beschi

    Protecting an AWS ALB behind an AWS Cloudfront Distribution

    Reducing the number of entry points into VPCs reduce the surface of possible attacks. Which in the end makes our infrastructures a lot more secure. When an AWS Cloudfront distribution...

    Read More

    Now it’s your turn!

    Schedule a 1-on-1 with an ARHS Cloud Expert today!