Security Keep in touch

How to pentest AWS Cognito? Attack and remediation explained
So, you are pentesting a website, and it uses AWS Cognito. But you don’t know what is this service nor how to abuse it? Let's see how to pwn it!

Secure your authentication to your data warehouse with SSO and Snowflake
You don’t know what kind of service you want to use for your data warehouse? Learn why you might consider using Snowflake with SSO!

The sole purpose of SSL Certificates
The internet is a vast space. Your computer interacts with multiple other entities. SSL certificates play a key role in making the web a safer place.

Secure your Azure cloud with a private hub and spoke infrastructure
Secure your Azure cloud with a private hub and spoke infrastructure with private endpoints, private DNS, Azure policy, and private DNS resolver.

What is a Pentest?
Pentesting is one of the main activities of the Padok SecOps team. Find out what it is and how our methodology helps us organize our week.

How to encrypt data at rest with a Customer Managed Key with Terraform
Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.

What is Apparmor and how to add a security layer with it in Docker?
AppArmor is a Linux kernel module for security which interfaces with Docker to confine applications that run in containers.

Secure your Github Actions deployments on GCP with Identity Federation
Learn how you can manually set up Identity Federation, and how doing it with Terraform can allow Github Actions to access your GCP resources.

Kubernetes cluster admin role: the Role-based Access Control
Role-based Access control in Kubernetes will enable you to secure access to your cluster. Discover what is RBAC, how to use it and some tools!

Using OAuth 2.0 and Terraform to secure your Azure App Service
Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.

Azure Managed Identities to enforce the security of your platform
The management of credentials and secrets is always a challenge. Learn how to delegate this issue to Azure using Managed Identities.

Create a Docker image using Multi-Stage Builds
Are you tired of creating huge contraptions to optimize your Dockerfiles? Use Multi-Stage to develop a single docker image for all your environments.

Secure internal traffic with machine to machine auth on Azure
The security of your infrastructure is as strong as it’s weakest links. Learn how to secure it by adding machine to machine authentication on Azure.

DevSecOps tools: what tools to apply good security practices?
DevSecOps allow for better and more secure applications. Fewer vulnerabilities, fewer problems. This article focuses on DevSecOps tools.

DevSecOps: apply DevOps principles to increase your system security
DevSecOps is an extension of DevOps that integrates security into the software delivery process and enables faster, safer deployment of code in production.

Kube-monkey: Bring chaos into your Kubernetes deployments.
Kube-monkey is a tool that helps you test the resilience of your Kubernetes cluster by randomly deleting pods. It allows to see how it responds to the outage.

AWS IAM: Understanding the Key Concepts of IAM services
What is AWS IAM? Accounts, users, roles, requests, policies… 5 minutes to understand AWS IAM mechanics. Use IAM to deal with identity and authorization.