Technology (2) Keep in touch
![How to use honey tokens effectively to detect intrusion in AWS](https://www.padok.fr/hubfs/Images/Blog/honey-tokens%20%281%29.webp)
How to use honey tokens effectively to detect intrusion in AWS
Explore the effectiveness of Honey Tokens in AWS. Learn how to deploy and strategically position them to early detect potential attackers.
![Easily plug any webapp to any IdP using oauth2-proxy](https://www.padok.fr/hubfs/Images/Blog/Oauth2-Proxy%20%281%29.webp)
Easily plug any webapp to any IdP using oauth2-proxy
Learn how to implement an oauth2-proxy on your kubernetes cluster for secure and easy access to your apps with SSO.
![AWS Application Load Balancer Authentication](https://www.padok.fr/hubfs/Images/Blog/alb%20%281%29.webp)
AWS Application Load Balancer Authentication
Learn how to authenticate your users to your applications with an Application Load Balancer and AWS Cognito.
![IAM Identity Center: why you should get rid of IAM Users](https://www.padok.fr/hubfs/Images/Blog/IAM.webp)
IAM Identity Center: why you should get rid of IAM Users
Do you use IAM users to manage the employees? Let’s see why it is a huge mistake and why you should replace it with AWS IAM Identity Center.
![An introduction to Policy As Code](https://www.padok.fr/hubfs/Images/Blog/PaC%20%281%29.webp)
An introduction to Policy As Code
This article will give you guidance on how to build a Policy As Code system that encourages teams to adopt it while not affecting their productivity.
![How to pentest AWS Cognito? Attack and remediation explained](https://www.padok.fr/hubfs/Imported_Blog_Media/pentest_aws_cognito-1.webp)
How to pentest AWS Cognito? Attack and remediation explained
So, you are pentesting a website, and it uses AWS Cognito. But you don’t know what is this service nor how to abuse it? Let's see how to pwn it!
![Enable AWS GuardDuty Malware Protection to detect suspicious activity](https://www.padok.fr/hubfs/Images/Blog/AWS-GuardDuty.webp)
Enable AWS GuardDuty Malware Protection to detect suspicious activity
Learn how to enhance your cloud security posture with GuardDuty's intelligent threat detection capabilities and safeguard your AWS infrastructure.
![AWS Cloudfront: how to configure a WAF on a CloudFront?](https://www.padok.fr/hubfs/Imported_Blog_Media/waf_cloudfront-1.webp)
AWS Cloudfront: how to configure a WAF on a CloudFront?
In this article, we'll look at howw to implement a WAF on AWS components such as CloudFront or API-gateway.
![Secure your Azure cloud with a private hub and spoke infrastructure](https://www.padok.fr/hubfs/Imported_Blog_Media/azure_spoke_infrastructure-1.webp)
Secure your Azure cloud with a private hub and spoke infrastructure
Secure your Azure cloud with a private hub and spoke infrastructure with private endpoints, private DNS, Azure policy, and private DNS resolver.