DEV Community

Warren Parad profile picture

Warren Parad

Long time software architect, CTO Authress, creating application security plug-ins for any software application with Authress. Talk to me about security in microservices or service authorization.

Location Switzerland Joined Joined on  Personal website https://authress.io github website

Work

CTO @Authress

Seven Year Club
Six Year Club
Writing Debut
Five Year Club
Four Year Club
1 Week Community Wellness Streak
Three Year Club
Beloved Comment
Two Year Club
One Year Club
4 Week Writing Streak
How when AWS was down, we were not

How when AWS was down, we were not

Image Image Image 18
Comments 2
37 min read

Want to connect with Warren Parad?

Create an account to connect with Warren Parad. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
AWS Auth Caching Strategies

AWS Auth Caching Strategies

Image Image Image 16
Comments 1
7 min read
API Gateway Authorizers: Vulnerable By Design (be careful!)

API Gateway Authorizers: Vulnerable By Design (be careful!)

Image Image Image 16
Comments 1
5 min read
The Blog Post Release Automation

The Blog Post Release Automation

Image Image Image 11
Comments 1
4 min read
The Risks of User Impersonation

The Risks of User Impersonation

Image Image Image 11
Comments
20 min read
Migrating CloudFormation to TF

Migrating CloudFormation to TF

Image Image Image 19
Comments 3
5 min read
Are millions of accounts vulnerable due to Google's OAuth Flaw?

Are millions of accounts vulnerable due to Google's OAuth Flaw?

Image Image Image 11
Comments 1
9 min read
AWS Advanced: The Quota Monitor Review

AWS Advanced: The Quota Monitor Review

Image Image Image 21
Comments 1
6 min read
Idempotency in DynamoDB

Idempotency in DynamoDB

Image Image Image 26
Comments 2
12 min read
AWS Advanced: Getting SES Production Access

AWS Advanced: Getting SES Production Access

Image Image Image 21
Comments 3
7 min read
Securing your secrets in AWS

Securing your secrets in AWS

Image Image Image 34
Comments 2
34 min read
How does machine to machine authentication work?

How does machine to machine authentication work?

Image Image Image 9
Comments
11 min read
AWS Advanced: Serverless Prometheus in Action

AWS Advanced: Serverless Prometheus in Action

Image Image Image 17
Comments
12 min read
AWS Metrics: Advanced

AWS Metrics: Advanced

Image Image Image 13
Comments
10 min read
AWS VPC: Private Subnets Increase Risk

AWS VPC: Private Subnets Increase Risk

Image Image Image 13
Comments
6 min read
Marketing your Product effectively

Marketing your Product effectively

Comments
2 min read
The Devastating Failure of Technical Leadership

The Devastating Failure of Technical Leadership

Image Image Image 17
Comments
10 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

Image Image Image 12
Comments 2
11 min read
Myths about API HTTP clients

Myths about API HTTP clients

Image Image Image 11
Comments
6 min read
You are probably testing wrong

You are probably testing wrong

Image Image Image 13
Comments
11 min read
Breaking up the monolith: Breaking changes

Breaking up the monolith: Breaking changes

Image Image Image 27
Comments
11 min read
Measuring team success

Measuring team success

Image Image Image 10
Comments
10 min read
The Required team meetings

The Required team meetings

Image Image Image 9
Comments
11 min read
AWS CloudWatch: How to scale your logging infrastructure

AWS CloudWatch: How to scale your logging infrastructure

Image Image Image 10
Comments
8 min read
Step-up authorization

Step-up authorization

Image Image Image 13
Comments
6 min read
Breaking up the monolith: Zero downtime migrations

Breaking up the monolith: Zero downtime migrations

Image Image Image 14
Comments
4 min read
Adding Custom Domains to your SaaS

Adding Custom Domains to your SaaS

Image Image Image 34
Comments 15
7 min read
AWS Cognito: Don’t go to production

AWS Cognito: Don’t go to production

Image Image Image 28
Comments
7 min read
My DNS doesn't work

My DNS doesn't work

Image Image Image 20
Comments
4 min read
AWS Step Functions: Advanced

AWS Step Functions: Advanced

Image Image Image 21
Comments
10 min read
I got a CORS error, now what?

I got a CORS error, now what?

Image Image Image 22
Comments 2
5 min read
Breaking up the monolith: Magic identifiers

Breaking up the monolith: Magic identifiers

Image Image Image 14
Comments
8 min read
Can’t connect to service running in EC2

Can’t connect to service running in EC2

Image Image Image 14
Comments
4 min read
When to use AWS Credentials

When to use AWS Credentials

Image Image Image 23
Comments
5 min read
The Punishment of Building a Slack App

The Punishment of Building a Slack App

Image Image Image 18
Comments
16 min read
JWT access token misconceptions

JWT access token misconceptions

Image Image Image 15
Comments
6 min read
AWS + Gitlab — Leveling up security of your CICD platform.

AWS + Gitlab — Leveling up security of your CICD platform.

Image Image Image 15
Comments
4 min read
Creating resources in custom AWS accounts

Creating resources in custom AWS accounts

Image Image Image 14
Comments
2 min read
AWS DynamoDB: Single or Multitable

AWS DynamoDB: Single or Multitable

Image Image Image 14
Comments
1 min read
To message bus or not to message bus

To message bus or not to message bus

Image Image Image 12
Comments
6 min read
Making an infinite CSS carousel

Making an infinite CSS carousel

Image Image Image 77
Comments
4 min read
Security for deleting resources

Security for deleting resources

Image Image Image 13
Comments
4 min read
The Wolf Pack Team

The Wolf Pack Team

Image Image Image 15
Comments
3 min read
Things that are wrong with Terraform

Things that are wrong with Terraform

Image Image Image 12
Comments
3 min read
Breach — Enabling emergency data protection

Breach — Enabling emergency data protection

Image Image Image 12
Comments
6 min read
Promotion in Action: What everyone should know to get to the next level

Promotion in Action: What everyone should know to get to the next level

Image Image Image 13
Comments
8 min read
API Authentication :  Creating service client API keys

API Authentication :  Creating service client API keys

Image Image Image 17
Comments 1
3 min read
Setup user authentication with any identity provider

Setup user authentication with any identity provider

Image Image Image 14
Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

Image Image Image 17
Comments
2 min read
Choosing the right access control strategy

Choosing the right access control strategy

Image Image Image 14
Comments
7 min read
Creating the right environment

Creating the right environment

Image Image Image 9
Comments
9 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

Image Image Image 22
Comments
4 min read
Choosing the right error code 401, 403, or 404

Choosing the right error code 401, 403, or 404

Image Image Image 12
Comments 1
4 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

Image Image Image 15
Comments
8 min read
7 Steps to Web Application Security

7 Steps to Web Application Security

Image Image Image 17
Comments
6 min read
Hacking your Product Support Strategy

Hacking your Product Support Strategy

Image Image Image 24
Comments
11 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

Image Image Image 12
Comments 1
4 min read
AWS Free Tier Cost

AWS Free Tier Cost

Image Image Image 18
Comments
3 min read
X-Ray in Lamba

X-Ray in Lamba

Image Image Image 18
Comments
5 min read
Javascript private fields are coming

Javascript private fields are coming

Image Image Image 18
Comments 5
2 min read
loading...