Architecture posts

  • Architecture
  • Cloud security

OIDC workload identity on AWS

  • icon Nov 04, 2025
  • icon 11 minutes read
  • icon 2335
Update: after years of being on the wish list of a ton of top AWS teams, AWS released a built-in version of this feature about two weeks after we published this. Never let it be said gentle ribbing doesn’t work. Also, thanks AWS! We meant it …
Read more
  • Architecture
  • Detection & response

Lessons in logging: chopping down security risks using audit trails

  • icon Nov 28, 2023
  • by Aditya Mukerjee
  • icon 13 minutes read
  • icon 2705
This post is the first in a series about logging and audit trails from a security perspective. For the next post in the series, see Lessons in Logging, Part 2: Mapping Your Path to a Mature Security Program with Logs and Audit Trails At Latacora, we …
Read more
  • Architecture

A Child’s Garden of Inter-Service Authentication Schemes

  • icon Jun 12, 2018
  • icon 17 minutes read
  • icon 3515
Modern applications tend to be composed from relationships between smaller applications. Secure modern applications thus need a way to express and enforce security policies that span multiple services. This is the “server-to-server” (S2S) …
Read more