Curiosity Leads. Experience Guides. Clarity Follows.

I use this space to learn, explore new technologies, and share patterns I come across in security, AI, cloud architecture, wellness, and whatever else catches my curiosity. I also vibe code to kindle my creative side, and thanks to AI for removing the friction. Everything broken down from first principles, based on my own experience and opinions, not those of my employer. If you spot anything off, feel free to reach out.

Rajganesh Pandurangan

Rajganesh Pandurangan

Security Solutions Architect · Author · AI & Cloud Security

raj@satorisec.com · LinkedIn

Security solutions architect with 25 years in IT. I work with top enterprise companies on cloud security architecture, helping them translate business requirements into secure, scalable solutions across cloud infrastructure, applications, and AI/ML platforms.

My recent work focuses on securing GenAI platforms on Amazon Bedrock, conducting threat modeling for agentic AI systems, designing multi-account governance for organizations with 1,000+ AWS accounts, and leading security reviews for enterprise cloud migrations. I specialize in identity and access management (OAuth, OIDC, SAML, Cognito, Identity Center), encryption and key management (TLS, PKI, KMS), and multi-account governance (Organizations, SCPs, Control Tower, Landing Zone Accelerator).

My earlier career was rooted in hands-on security consulting: penetration testing, red team engagements, application security assessments, and compliance programs (PCI, HIPAA) for Fortune 100 companies. That offensive background shapes how I think about defense today.

I write about security the way I wish someone had explained it to me: from first principles, no jargon, one concept building on the last.

CISSP OSCP AWS Security Specialty AWS GenAI Developer Professional AWS DevOps Professional

raj@satorisec.com · LinkedIn

Blog

Deep dives and first-principles explanations on security, identity, and cloud architecture.

April 3, 2026 · Cloud

AWS CodeBuild: The Serverless Command Runner You're Not Using

You don't need EC2, ECS, or EKS just to run a script. CodeBuild can run your commands in a container and shut down when it's done.

April 3, 2026 · Cloud Security

AWS Security from First Principles: Identity, Encryption, and Governance (Part 2)

IAM policy evaluation, SCPs, KMS encryption, and the security services that tie everything together.

April 3, 2026 · Cloud Security

AWS Security from First Principles: Network and Infrastructure (Part 1)

Control plane vs data plane, Security Groups vs NACLs, WAF, ALB vs NLB, VPC endpoints, and PrivateLink.

March 30, 2026 · Identity

AgentCore Identity: Patterns, Security, and Lessons from the Field (Part 3)

Three deployment patterns for agent identity, security properties you get out of the box, and practical lessons from real-world AgentCore deployments.

Read more →
March 28, 2026 · Identity

How AgentCore Identity Actually Works (Part 2)

The architecture behind AWS Bedrock AgentCore Identity: components, inbound auth modes, outbound OAuth flows, session binding, and how the pieces fit together.

Read more →
March 26, 2026 · Identity

The Identity Problem for AI Agents (Part 1)

When an AI agent reads your Google Calendar, whose identity is it using? Three identities, three tokens, and the confused deputy problem that makes agent security hard.

Read more →
March 25, 2026 · AI Security

AI Security: The Areas Every Organization Should Be Thinking About

AI security isn't one thing. It's a collection of very different problems. A straightforward breakdown of each area, what it solves, and how they fit together.

Read more →
March 12, 2026 · Cloud Security

Understanding AWS Public Resources: What's Actually Exposed and What to Fix First

Your security scanner says everything is public. Most of it isn't. Here's how to tell the difference between real exposure and noise, and where to focus first.

Read more →
February 18, 2026 · Cloud Security

SCPs vs RCPs: Understanding the Principal from Opposite Directions

Both restrict access in AWS Organizations, but they look at the problem from opposite directions. One controls your people, the other protects your resources.

Read more →
February 3, 2026 · Wellness

Wim Hof Breathing: A Shortcut to the Alpha State

How I use Wim Hof breathing to quickly reach the meditative Alpha state, and how it connects to Silva meditation.

Read more →
January 20, 2026 · Wellness

Silva Meditation: Training Your Mind Like You Train Your Skills

How the Silva Method helped me think clearer, sleep better, and approach problems differently. And why it matters for people in tech.

Read more →
January 8, 2026 · Wellness

The 4-7-8 Breathing Technique

A 60-second breathing technique that resets your nervous system. Why every tech professional should take a minute to breathe.

Read more →
July 2025 · Cloud Security

AWS Steampipe SQL Queries

A collection of working Steampipe SQL queries for AWS. Query IAM, EC2, S3, VPCs, and more using SQL syntax.

Read more →
July 2025 · Personal

Why satorisec

The story behind the name and what this project is about.

Read more →
January 2025 · Security

Secure Python Server-Client Communication with OpenSSL

Setting up secure Python server and client communication using OpenSSL-generated certificates.

Read more →
November 2023 · Personal

Uncover Your Ikigai: The Japanese Way of Life

Finding what makes you happy and gives your life purpose by discovering the overlap of passion, skill, need, and reward.

Read more →
October 2023 · Security Tools

The Top 10 Nmap Commands You Need to Know

Common Nmap commands with examples for discovering hosts and services on a network.

Read more →
June 2023 · Identity & Security

Introduction to SAML 2.0

Understanding the difference between SAML 2.0 and OIDC for authentication and authorization.

Read more →
February 2023 · Personal

Do You Need an Online Presence?

Why having your own website gives you credibility and how to create one for free.

Read more →
January 2023 · Career

Career Advice for Aspiring Ethical Hackers

Changing industry trends in vulnerability assessment, red teaming, and technical assessments.

Read more →
June 2022 · Mathematics

The Hunt for Prime Numbers

An overview of various techniques for finding prime numbers and why they matter in cryptography.

Read more →
March 2022 · Security Tools

The Top Netcat Commands: Swiss Army Knife for Hackers

Netcat is a network service for reading and writing connections using TCP or UDP. Here are the essential commands.

Read more →
March 2022 · Career

Polymath vs Specialization

The pros and cons of being a generalist versus a specialist in your career.

Read more →
December 2021 · Python

Setting up Python Playground

Getting started with Python for creating security tools, from basics to advanced features.

Read more →
August 2021 · Personal

Breaking the Cycle: Overcoming the Crisis of Inaction

Constantly planning but never taking action? Here's how to break the cycle.

Read more →