close

DEV Community

Warren Parad profile picture

Warren Parad

Long time software architect, CTO Authress, creating application security plug-ins for any software application with Authress. Talk to me about security in microservices or service authorization.

Location Switzerland Joined Joined on  Personal website https://authress.io github website

Work

CTO @Authress

Seven Year Club
Six Year Club
Writing Debut
Five Year Club
Four Year Club
1 Week Community Wellness Streak
Three Year Club
Beloved Comment
Two Year Club
One Year Club
4 Week Writing Streak
Making rate limiting in AWS less terrible

Making rate limiting in AWS less terrible

BERJAYA BERJAYA BERJAYA 11
Comments
54 min read

Want to connect with Warren Parad?

Create an account to connect with Warren Parad. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Actually Fixing AWS S3

Actually Fixing AWS S3

BERJAYA BERJAYA BERJAYA 12
Comments
45 min read
Securing CI/CD Access to AWS

Securing CI/CD Access to AWS

BERJAYA BERJAYA BERJAYA 14
Comments
5 min read
How when AWS was down, we were not

How when AWS was down, we were not

BERJAYA BERJAYA BERJAYA 18
Comments 2
37 min read
AWS Auth Caching Strategies

AWS Auth Caching Strategies

BERJAYA BERJAYA BERJAYA 16
Comments 1
7 min read
API Gateway Authorizers: Vulnerable By Design (be careful!)

API Gateway Authorizers: Vulnerable By Design (be careful!)

BERJAYA BERJAYA BERJAYA 16
Comments 1
5 min read
The Blog Post Release Automation

The Blog Post Release Automation

BERJAYA BERJAYA BERJAYA 11
Comments 1
4 min read
The Risks of User Impersonation

The Risks of User Impersonation

BERJAYA BERJAYA BERJAYA 11
Comments
20 min read
Migrating CloudFormation to TF

Migrating CloudFormation to TF

BERJAYA BERJAYA BERJAYA 19
Comments 3
5 min read
Are millions of accounts vulnerable due to Google's OAuth Flaw?

Are millions of accounts vulnerable due to Google's OAuth Flaw?

BERJAYA BERJAYA BERJAYA 11
Comments 1
9 min read
AWS Advanced: The Quota Monitor Review

AWS Advanced: The Quota Monitor Review

BERJAYA BERJAYA BERJAYA 21
Comments 1
6 min read
Idempotency in DynamoDB

Idempotency in DynamoDB

BERJAYA BERJAYA BERJAYA 26
Comments 2
12 min read
AWS Advanced: Getting SES Production Access

AWS Advanced: Getting SES Production Access

BERJAYA BERJAYA BERJAYA 23
Comments 3
7 min read
Securing your secrets in AWS

Securing your secrets in AWS

BERJAYA BERJAYA BERJAYA 34
Comments 2
34 min read
How does machine to machine authentication work?

How does machine to machine authentication work?

BERJAYA BERJAYA BERJAYA 9
Comments
11 min read
AWS Advanced: Serverless Prometheus in Action

AWS Advanced: Serverless Prometheus in Action

BERJAYA BERJAYA BERJAYA 17
Comments
12 min read
AWS Metrics: Advanced

AWS Metrics: Advanced

BERJAYA BERJAYA BERJAYA 13
Comments
10 min read
AWS VPC: Private Subnets Increase Risk

AWS VPC: Private Subnets Increase Risk

BERJAYA BERJAYA BERJAYA 13
Comments
6 min read
Marketing your Product effectively

Marketing your Product effectively

Comments
2 min read
The Devastating Failure of Technical Leadership

The Devastating Failure of Technical Leadership

BERJAYA BERJAYA BERJAYA 17
Comments
10 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

BERJAYA BERJAYA BERJAYA 12
Comments 2
11 min read
Myths about API HTTP clients

Myths about API HTTP clients

BERJAYA BERJAYA BERJAYA 11
Comments
6 min read
You are probably testing wrong

You are probably testing wrong

BERJAYA BERJAYA BERJAYA 13
Comments
11 min read
Breaking up the monolith: Breaking changes

Breaking up the monolith: Breaking changes

BERJAYA BERJAYA BERJAYA 27
Comments
11 min read
Measuring team success

Measuring team success

BERJAYA BERJAYA BERJAYA 10
Comments
10 min read
The Required team meetings

The Required team meetings

BERJAYA BERJAYA BERJAYA 9
Comments
11 min read
AWS CloudWatch: How to scale your logging infrastructure

AWS CloudWatch: How to scale your logging infrastructure

BERJAYA BERJAYA BERJAYA 10
Comments
8 min read
Step-up authorization

Step-up authorization

BERJAYA BERJAYA BERJAYA 13
Comments
6 min read
Breaking up the monolith: Zero downtime migrations

Breaking up the monolith: Zero downtime migrations

BERJAYA BERJAYA BERJAYA 14
Comments
4 min read
Adding Custom Domains to your SaaS

Adding Custom Domains to your SaaS

BERJAYA BERJAYA BERJAYA 34
Comments 15
7 min read
AWS Cognito: Don’t go to production

AWS Cognito: Don’t go to production

BERJAYA BERJAYA BERJAYA 28
Comments
7 min read
My DNS doesn't work

My DNS doesn't work

BERJAYA BERJAYA BERJAYA 20
Comments
4 min read
AWS Step Functions: Advanced

AWS Step Functions: Advanced

BERJAYA BERJAYA BERJAYA 21
Comments
10 min read
I got a CORS error, now what?

I got a CORS error, now what?

BERJAYA BERJAYA BERJAYA 23
Comments 2
5 min read
Breaking up the monolith: Magic identifiers

Breaking up the monolith: Magic identifiers

BERJAYA BERJAYA BERJAYA 14
Comments
8 min read
Can’t connect to service running in EC2

Can’t connect to service running in EC2

BERJAYA BERJAYA BERJAYA 14
Comments
4 min read
When to use AWS Credentials

When to use AWS Credentials

BERJAYA BERJAYA BERJAYA 23
Comments
5 min read
The Punishment of Building a Slack App

The Punishment of Building a Slack App

BERJAYA BERJAYA BERJAYA 18
Comments
16 min read
JWT access token misconceptions

JWT access token misconceptions

BERJAYA BERJAYA BERJAYA 15
Comments
6 min read
AWS + Gitlab — Leveling up security of your CICD platform.

AWS + Gitlab — Leveling up security of your CICD platform.

BERJAYA BERJAYA BERJAYA 15
Comments
4 min read
Creating resources in custom AWS accounts

Creating resources in custom AWS accounts

BERJAYA BERJAYA BERJAYA 14
Comments
2 min read
AWS DynamoDB: Single or Multitable

AWS DynamoDB: Single or Multitable

BERJAYA BERJAYA BERJAYA 14
Comments
1 min read
To message bus or not to message bus

To message bus or not to message bus

BERJAYA BERJAYA BERJAYA 12
Comments
6 min read
Making an infinite CSS carousel

Making an infinite CSS carousel

BERJAYA BERJAYA BERJAYA 78
Comments
4 min read
Security for deleting resources

Security for deleting resources

BERJAYA BERJAYA BERJAYA 13
Comments
4 min read
The Wolf Pack Team

The Wolf Pack Team

BERJAYA BERJAYA BERJAYA 15
Comments
3 min read
Things that are wrong with Terraform

Things that are wrong with Terraform

BERJAYA BERJAYA BERJAYA 12
Comments
3 min read
Breach — Enabling emergency data protection

Breach — Enabling emergency data protection

BERJAYA BERJAYA BERJAYA 12
Comments
6 min read
Promotion in Action: What everyone should know to get to the next level

Promotion in Action: What everyone should know to get to the next level

BERJAYA BERJAYA BERJAYA 13
Comments
8 min read
API Authentication :  Creating service client API keys

API Authentication :  Creating service client API keys

BERJAYA BERJAYA BERJAYA 17
Comments 1
3 min read
Setup user authentication with any identity provider

Setup user authentication with any identity provider

BERJAYA BERJAYA BERJAYA 14
Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

BERJAYA BERJAYA BERJAYA 17
Comments
2 min read
Choosing the right access control strategy

Choosing the right access control strategy

BERJAYA BERJAYA BERJAYA 14
Comments
7 min read
Creating the right environment

Creating the right environment

BERJAYA BERJAYA BERJAYA 9
Comments
9 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

BERJAYA BERJAYA BERJAYA 22
Comments
4 min read
Choosing the right error code 401, 403, or 404

Choosing the right error code 401, 403, or 404

BERJAYA BERJAYA BERJAYA 12
Comments 1
4 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

BERJAYA BERJAYA BERJAYA 15
Comments
8 min read
7 Steps to Web Application Security

7 Steps to Web Application Security

BERJAYA BERJAYA BERJAYA 17
Comments
6 min read
Hacking your Product Support Strategy

Hacking your Product Support Strategy

BERJAYA BERJAYA BERJAYA 24
Comments
11 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

BERJAYA BERJAYA BERJAYA 12
Comments 1
4 min read
loading...