Accept
This website is using cookies. More details
Blog

ARHS Spikeseed
cloud computing blog.

Our latest publications related to security

  • Mikhail Alekseev

    AWS EKS Security. IAM. Part 1

    Today, we are pleased to announce that we have set up a series of AWS EKS security-related blog posts. In these posts, we will cover the main principles of securing...

    Read More
  • Charles Guebels

    Protect a CloudFront distribution with Cognito or BasicAuth

    Amazon CloudFront is a very useful service for exposing multiple origin types like ALB, custom domains or S3 buckets. However, CloudFront does not provide a direct way to restrict access...

    Read More
  • Gokdag Goktepe

    OAuth 2.0 Authorization Code Flow & AWS Cognito

    The previous article introduced the OAuth 2.0 protocol, highlighting distinctions between authentication and authorization. OAuth 2.0, an industry-standard protocol, was discussed in the context of cloud-native applications, addressing security concerns...

    Read More
  • Charles Guebels

    AWS European Sovereign Cloud

    Recently AWS announced that it was working on a European Sovereign Cloud, this is a good opportunity to discover a little more about what is hidden behind this term and...

    Read More
  • Dimitri Appriou

    Effective secrets management in AWS

    Today, secrets are used everywhere. Being the key to infrastructures and the data they are holding, a compromised secret can lead to security breaches of catastrophic proportions. Consequently, securing secrets...

    Read More
  • Gokdag Goktepe

    Introduction to OAuth 2.0 Protocol

    “It’s a dangerous business, Frodo, going out your door.”

    Read More

    Now it’s your turn!

    Schedule a 1-on-1 with an ARHS Cloud Expert today!