I use this space to learn, explore new technologies, and share patterns I come across in security, AI, cloud architecture, wellness, and whatever else catches my curiosity. I also vibe code to kindle my creative side, and thanks to AI for removing the friction. Everything broken down from first principles, based on my own experience and opinions, not those of my employer. If you spot anything off, feel free to reach out.
Security Solutions Architect · Author · AI & Cloud Security
raj@satorisec.com · LinkedIn
Security solutions architect with 25 years in IT. I work with top enterprise companies on cloud security architecture, helping them translate business requirements into secure, scalable solutions across cloud infrastructure, applications, and AI/ML platforms.
My recent work focuses on securing GenAI platforms on Amazon Bedrock, conducting threat modeling for agentic AI systems, designing multi-account governance for organizations with 1,000+ AWS accounts, and leading security reviews for enterprise cloud migrations. I specialize in identity and access management (OAuth, OIDC, SAML, Cognito, Identity Center), encryption and key management (TLS, PKI, KMS), and multi-account governance (Organizations, SCPs, Control Tower, Landing Zone Accelerator).
My earlier career was rooted in hands-on security consulting: penetration testing, red team engagements, application security assessments, and compliance programs (PCI, HIPAA) for Fortune 100 companies. That offensive background shapes how I think about defense today.
I write about security the way I wish someone had explained it to me: from first principles, no jargon, one concept building on the last.
raj@satorisec.com · LinkedIn
Securing AI agents, GenAI platforms, RAG pipelines, and model governance. Agent identity and authorization, OAuth token propagation, tenant isolation, and application security reviews. How do you control what an autonomous agent can do? How do you prevent cross-tenant data leakage? That's the next frontier.
Designing security at scale on AWS. Multi-account governance, Organizations, SCPs, RCPs, Control Tower, Landing Zone Accelerator, OU design, data perimeters, network segmentation, and compliance gap analysis. Helping enterprises move from custom scripts to AWS-native governance.
SAML, OAuth, OIDC, federation, SSO, Cognito, Identity Center, and Cedar. Identity is the new perimeter. Zero Trust starts here. Designed and reviewed identity solutions for some of the largest enterprises in the world.
Securing data in transit and at rest, protecting sensitive workloads. TLS, PKI, KMS, key rotation, Nitro Enclaves, and FIPS compliance. The math is solved. The hard part is who holds the keys and how you manage them at scale.
Infrastructure assessments, application security reviews, and threat modeling using STRIDE and MAESTRO. Background in offensive security shapes how I think about defense.
Deep dives and first-principles explanations on security, identity, and cloud architecture.
You don't need EC2, ECS, or EKS just to run a script. CodeBuild can run your commands in a container and shut down when it's done.
IAM policy evaluation, SCPs, KMS encryption, and the security services that tie everything together.
Control plane vs data plane, Security Groups vs NACLs, WAF, ALB vs NLB, VPC endpoints, and PrivateLink.
Three deployment patterns for agent identity, security properties you get out of the box, and practical lessons from real-world AgentCore deployments.
Read more →The architecture behind AWS Bedrock AgentCore Identity: components, inbound auth modes, outbound OAuth flows, session binding, and how the pieces fit together.
Read more →When an AI agent reads your Google Calendar, whose identity is it using? Three identities, three tokens, and the confused deputy problem that makes agent security hard.
Read more →AI security isn't one thing. It's a collection of very different problems. A straightforward breakdown of each area, what it solves, and how they fit together.
Read more →Your security scanner says everything is public. Most of it isn't. Here's how to tell the difference between real exposure and noise, and where to focus first.
Read more →Both restrict access in AWS Organizations, but they look at the problem from opposite directions. One controls your people, the other protects your resources.
Read more →How I use Wim Hof breathing to quickly reach the meditative Alpha state, and how it connects to Silva meditation.
Read more →How the Silva Method helped me think clearer, sleep better, and approach problems differently. And why it matters for people in tech.
Read more →A 60-second breathing technique that resets your nervous system. Why every tech professional should take a minute to breathe.
Read more →A collection of working Steampipe SQL queries for AWS. Query IAM, EC2, S3, VPCs, and more using SQL syntax.
Read more →The story behind the name and what this project is about.
Read more →Setting up secure Python server and client communication using OpenSSL-generated certificates.
Read more →Finding what makes you happy and gives your life purpose by discovering the overlap of passion, skill, need, and reward.
Read more →Common Nmap commands with examples for discovering hosts and services on a network.
Read more →Understanding the difference between SAML 2.0 and OIDC for authentication and authorization.
Read more →Why having your own website gives you credibility and how to create one for free.
Read more →Changing industry trends in vulnerability assessment, red teaming, and technical assessments.
Read more →An overview of various techniques for finding prime numbers and why they matter in cryptography.
Read more →Netcat is a network service for reading and writing connections using TCP or UDP. Here are the essential commands.
Read more →The pros and cons of being a generalist versus a specialist in your career.
Read more →Getting started with Python for creating security tools, from basics to advanced features.
Read more →Constantly planning but never taking action? Here's how to break the cycle.
Read more →