Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Message Verification in Event-Driven Architectures Most of the access control techniques we’ve explored generally apply to synchronous, request/response APIs. But ...
Encryption in transit Data is in transit in a serverless application as it moves from service to service. All AWS ...
The Importance of Event Sourcing in Serverless Development Event sourcing is a way of capturing and persisting the changes happening ...
Architectural considerations for event sourcing At a high level, the concept of event sourcing is simple—but its implementation requires careful ...
EventStorming One of the classic problems in software engineering is balancing what’s in the requirements, and what gets implemented and ...
The importance of EventStorming in serverless development EventStorming is a great way to collaborate and to learn about business requirements, ...
Zero trust and serverless Zero trust is often touted as the next big thing in network security. Buzzwords and hype ...
The AWS Shared Responsibility Model AWS uses a shared responsibility model to define the remit of application security consumers and ...
Serverless Threat Modeling Before designing a comprehensive security strategy for any serverless application, it is crucial to understand the attack ...