Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Validating and Verifying API Requests There are other ways to protect your serverless API beyond the access control mecha‐ nisms ...
Data Encryption Everywhere As you develop and operate your serverless application, you will discover both the power and the challenges ...
Event consumers and event consumption best practices Event consumers are applications on the receiving end. They set up subscription policies ...
Uses for event sourcing Although early thoughts on event sourcing focused on the ability to re-create the current state of ...
Architectural considerations for event sourcing At a high level, the concept of event sourcing is simple—but its implementation requires careful ...
EventStorming One of the classic problems in software engineering is balancing what’s in the requirements, and what gets implemented and ...
The importance of EventStorming in serverless development EventStorming is a great way to collaborate and to learn about business requirements, ...
Combining the Zero Trust Security Model with Least Privilege Permissions There are two modern cybersecurity principles that you can leverage ...
Lambda execution roles A key use of IAM roles in serverless applications is Lambda function execution roles. An execution role ...