Unmasking the Invisible Adversary:The Evolving Art and Science of Threat Modeling

As applications and infrastructures become more complex and distributed, threat modeling has transformed into a continuous, integral part of modern DevSecOps. This post revisits threat modeling fundamentals and introduces the latest standards, methodologies, and technologies shaping this critical discipline today.

December 13, 2024 · (updated December 21, 2024) · 10 min · Pradeep Loganathan
Elevating Security in Software Development

Flipping the Script: Elevating Security to the Core of Application Design

This blog examines how prioritizing security from the outset transforms design and development practices, using real-world lessons like the Equifax breach.

November 25, 2024 · (updated December 21, 2024) · 14 min · Pradeep Loganathan
Securing the software supply chain

Securing the Software Supply Chain: A Developer's Guide

Learn how to secure the software supply chain by embracing best practices such as secure coding, CI/CD integration, SBOMs, and proactive monitoring.

September 5, 2024 · (updated December 21, 2024) · 22 min · Pradeep Loganathan
SSL Wildcard Certificates

How to Generate SSL Wildcard Certificates with ACME Challenges, Let's Encrypt, and Certbot

This blog post guides you through the process of generating SSL wildcard certificates using ACME challenges and Certbot, helping secure your domains with Let’s Encrypt.

July 7, 2024 · (updated December 21, 2024) · 6 min · Pradeep Loganathan
Deploying gatekeeper to a kubernetes cluster and defining constraints

Deploying OPA Gatekeeper and defining constraints

In this post we will deploy gatekeeper to a kubernetes cluster. We will then define constraints and ensure that gatekeeper enforces those constraints.

January 7, 2022 · (updated January 8, 2024) · 8 min · Pradeep Loganathan
jwt angular interceptor

JWT - Angular Interceptor

JSON Web Token(JWT) is an industry standard for security tokens used to securely transmit information between client and server as JSON objects.It provides a solution to the problem of passing claims between parties. In this post we will create an Angular interceptor to introspect JWT tokens.

May 19, 2018 · (updated December 5, 2023) · 4 min · Pradeep Loganathan

OpenID Connect

OpenID Connect is a simple identity layer built on top of the OAuth 2.0 protocol. OpenID Connect is all about authentication while OAuth is an authorization protocol. In OAuth, authorization is delegated while in OpenID Connect, authentication is delegated. OpenID Connect allows clients to verify end users based on the authentication performed by an auth server. It is also used to obtain basic profile information about the end user in a standards-based, interoperable and REST-like manner. OpenID Connect provides a standard way to obtain user identity.A central part of the OpenID Connect specification is the ID Token. It provides an identity token with information about the user. It also defines an endpoint to get identity information for that user, such as their name or e-mail address. This endpoint is called the user info endpoint. The identity token is a simple JWT token signed by the OpenID provider(OP) through OAuth protocol to suit web, mobile, and browser-based applications.The Identity token is encoded into the base 64 URL-safe string that contains information such as subject (sub), issuing authority (iss), audience (aud), and more. It may also contain some extra information about the user or custom claims in a set of scopes. As OpenID Connect is built on top of the Oauth2 protocol, the flows are the same. It can be used with the authorization code grant and the implicit grant. It’s not possible with the client credentials grant, as the client credentials grant is for server-to-server communication.As part of the oAuth flow, Instead of only requesting an access token, we can request an additional ID token from the security token service (STS) that implements the OpenID Connect specification. The client receives an ID token, and usually, also an access token. The ID token is kept small with the minimal information in it. To get more information for the authenticated user, the client can then send a request to the user info endpoint with the access token. This user info endpoint will then return the claims about the new user. ...

May 3, 2018 · (updated January 16, 2022) · 3 min · Pradeep Loganathan
What is a JSON Web Token (JWT)?

JWT - Creating a token server

JSON Web Token(JWT) is an industry standard for security tokens used to securely transmit information between client and server as JSON objects.It provides a solution to the problem of passing claims between parties. In this post we will be implementing a JWT token server which will serve tokens to users with the appropriate credentials.

April 21, 2018 · (updated December 5, 2023) · 4 min · Pradeep Loganathan
What is a JSON Web Token (JWT)?

What is a JSON Web Token (JWT)?

JSON Web Token(JWT) is an industry standard for security tokens used to securely transmit information between client and server as JSON objects.It provides a solution to the problem of passing claims between parties.

April 21, 2018 · (updated December 21, 2024) · 5 min · Pradeep Loganathan

Threat Modeling

In a world increasingly reliant on digital infrastructure, security is no longer a static state but a continuous process. Reactive security is a gamble no organization can afford. Proactive defense is paramount, and threat modeling stands as a crucial first line of defense. Threat modeling provides a structured approach to proactively identify and mitigate security risks. It’s about stepping into the mindset of an attacker, systematically examining your systems—whether a complex application, a sprawling network, or a cloud deployment—to pinpoint potential weaknesses. Threat modeling uncovers potential vulnerabilities, maps likely attack paths, and empowers teams to fortify their defenses preemptively. This process involves visualizing attack vectors, assessing potential impact, and prioritizing mitigation efforts. More than a mere checklist, it’s a dynamic process that blends analytical rigor with creative foresight, enabling you to anticipate and mitigate threats before they materialize. ...

August 21, 2017 · (updated December 21, 2024) · 9 min · Pradeep Loganathan