ARHS Spikeseed
cloud computing blog.
Our latest publications related to security
-
Charles Guebels
Protect a CloudFront distribution with Cognito or BasicAuth
Amazon CloudFront is a very useful service for exposing multiple origin types like ALB, custom domains or S3 buckets. However, CloudFront does not provide a direct way to restrict access...
Read More -
Gokdag Goktepe
OAuth 2.0 Authorization Code Flow & AWS Cognito
The previous article introduced the OAuth 2.0 protocol, highlighting distinctions between authentication and authorization. OAuth 2.0, an industry-standard protocol, was discussed in the context of cloud-native applications, addressing security concerns...
Read More -
Charles Guebels
AWS European Sovereign Cloud
Recently AWS announced that it was working on a European Sovereign Cloud, this is a good opportunity to discover a little more about what is hidden behind this term and...
Read More -
Dimitri Appriou
Effective secrets management in AWS
Today, secrets are used everywhere. Being the key to infrastructures and the data they are holding, a compromised secret can lead to security breaches of catastrophic proportions. Consequently, securing secrets...
Read More -
Gokdag Goktepe
Introduction to OAuth 2.0 Protocol
“It’s a dangerous business, Frodo, going out your door.”
Read More -
Yohan Beschi
Protecting an AWS ALB behind an AWS Cloudfront Distribution
Reducing the number of entry points into VPCs reduce the surface of possible attacks. Which in the end makes our infrastructures a lot more secure. When an AWS Cloudfront distribution...
Read More
Now it’s your turn!
Schedule a 1-on-1 with an ARHS Cloud Expert today!