Warren Parad

Warren Parad @wparad

About: Long time software architect, CTO Authress, creating application security plug-ins for any software application with Authress. Talk to me about security in microservices or service authorization.

Location:
Switzerland
Joined:
Jul 22, 2018

Warren Parad
articles - 64 total

AWS Auth Caching Strategies

Caching is difficult to get right and often means you need to pull in additional frameworks into your...

Learn More 16 1Jun 17

API Gateway Authorizers: Vulnerable By Design (be careful!)

I had the benefit of joining the AWS Community Day in Zürich this week, most went as expected but,...

Learn More 16 1May 23

The Blog Post Release Automation

The Blog Post Release Automation I made this mistake this week of believing I wanted to...

Learn More 11 1May 19

[Boost]

The Risks of User Impersonation ...

Learn More 0 0Jan 24

The Risks of User Impersonation

What is user impersonation? User impersonation is anything that allows your systems to...

Learn More 11 0Jan 24

Migrating CloudFormation to TF

One day you might find yourself in the unfortunate position of wanting to migrate away from...

Learn More 18 3Jan 21

Are millions of accounts vulnerable due to Google's OAuth Flaw?

This article is a rebuttal to Truffle Security's post on Millions of Accounts Vulnerable due to...

Learn More 11 1Jan 15

AWS Advanced: The Quota Monitor Review

$78,641.25 Per Month. That's the predicted amount of running the official quota monitor...

Learn More 21 0Jan 9

Idempotency in DynamoDB

It shouldn't be any surprise that we rely on DynamoDB over at Authress for a variety of things. For...

Learn More 26 2Nov 22 '24

AWS Advanced: Getting SES Production Access

Authors: Warren Parad, Eduardo Santana We made this decision because we believe that your use case...

Learn More 19 3Aug 25 '24

Securing your secrets in AWS

Secrets and credentials are everywhere, we use them to access third party systems. At Authress we...

Learn More 34 2Jul 24 '24

How does machine to machine authentication work?

Machine to machine auth is how you ensure secure communication between individual services, and each...

Learn More 9 0Dec 6 '23

AWS Advanced: Serverless Prometheus in Action

(Note, this article continues from Part 1: AWS Metrics: Advanced) We can't use...

Learn More 16 0Aug 22 '23

AWS Metrics: Advanced

Normally I'm the last proponent of collecting metrics. The reason is: metrics don't tell you...

Learn More 13 0Aug 22 '23

AWS VPC: Private Subnets Increase Risk

Should I put my service in the private subnet or the public one? This age old question has...

Learn More 13 0Jul 23 '23

Marketing your Product effectively

Often I've come across what can only be describe as a Beg-Ad. That's: I built something, please,...

Learn More 0 0Jul 10 '23

The Devastating Failure of Technical Leadership

I'm going to tell you a story, one that may even have happened to you. The sad truth is this a very...

Learn More 17 0Jul 10 '23

Denylists and Invaliding user access

This article is part of the Authress Academy and discusses the different ways to invalidate a user's...

Learn More 12 2Jul 5 '23

Myths about API HTTP clients

Having built many Product APIs in my experience for multiple companies, there are a number of Myths...

Learn More 11 0Jun 29 '23

You are probably testing wrong

How to think about testing, which tests you need, and when to write the right test.

Learn More 13 0Feb 2 '23

Breaking up the monolith: Breaking changes

Before we get into how to handle a breaking change, we should first identify what is even a breaking...

Learn More 27 0Aug 5 '22

Measuring team success

It should be a inevitable conclusion that you to need to measure the success of your teams. After...

Learn More 10 0Sep 5 '22

The Required team meetings

The required team meetings There is no shortage of advice out there on knowing when to...

Learn More 9 0Sep 5 '22

AWS CloudWatch: How to scale your logging infrastructure

An obvious story you might decide to tell yourself is Logging is easy. And writing to the console or...

Learn More 10 0May 30 '22

Step-up authorization

Step up authorization is the process of converting a user’s auth from a base level to an elevated or...

Learn More 13 0May 24 '22

Breaking up the monolith: Zero downtime migrations

It’s pretty common in monolith architectures to have to handle migrations. But this isn’t the only...

Learn More 14 0May 24 '22

Adding Custom Domains to your SaaS

You're building out a SaaS solution and realize for one reason or another supporting custom domains...

Learn More 33 15Feb 25 '22

AWS Cognito: Don’t go to production

AWS Cognito is AWS auth solution, it’s much better than Azure’s and many others that think Auth is...

Learn More 27 0Jan 23 '22

My DNS doesn't work

Making changes to your DNS and it still doesn't work, here's a troubleshooting guide

Learn More 20 0Jan 21 '22

AWS Step Functions: Advanced

The optimized step function This is the advanced guide to using AWS Step Functions. Step functions...

Learn More 21 0Dec 20 '21