Skip to content

Software Architecture for Building Serverless Microservices

Close Menu

The AWS Shared Responsibility Model – Serverless and SecurityThe AWS Shared Responsibility Model – Serverless and Security


2022-03-152022-03-15

The AWS Shared Responsibility Model AWS uses a shared responsibility model to define the remit of application security consumers and ...


Read MoreRead More

Meet the OWASP Top 10 – Serverless and SecurityMeet the OWASP Top 10 – Serverless and Security


2022-01-262022-01-26

Meet the OWASP Top 10 Cybersecurity is an incredibly well-researched area, with security professionals con‐ stantly assessing the ever-changing software ...


Read MoreRead More

Serverless Threat Modeling – Serverless and SecurityServerless Threat Modeling – Serverless and Security


2021-12-102021-12-10

Serverless Threat Modeling Before designing a comprehensive security strategy for any serverless application, it is crucial to understand the attack ...


Read MoreRead More

A process for threat modeling – Serverless and SecurityA process for threat modeling – Serverless and Security


2021-10-132021-10-13

A process for threat modeling As preparation for your threat modeling sessions, you may find it conducive to productive meetings ...


Read MoreRead More

Securing the Dependency Supply Chain – Serverless and SecuritySecuring the Dependency Supply Chain – Serverless and Security


2021-08-132021-08-13

Securing the Dependency Supply Chain Open source software is an incredible enabler of rapid software development and delivery. As a ...


Read MoreRead More

Scan packages for vulnerabilities – Serverless and SecurityScan packages for vulnerabilities – Serverless and Security


2021-06-262021-06-26

Scan packages for vulnerabilities You should also run continuous vulnerability scans in response to new packages, package upgrades, and reports ...


Read MoreRead More

Going Further with SLSA – Serverless and SecurityGoing Further with SLSA – Serverless and Security


2021-05-252021-05-25

Going Further with SLSA The SLSA security framework (pronounced salsa, short for Supply chain Levels for Software Artifacts) is “a ...


Read MoreRead More

Protecting Serverless APIs – Serverless and SecurityProtecting Serverless APIs – Serverless and Security


2021-02-052021-02-05

Protecting Serverless APIs According to the OWASP Top 10 list we looked at earlier in this chapter, the number one ...


Read MoreRead More

Securing REST APIs with Amazon Cognito – Serverless and SecuritySecuring REST APIs with Amazon Cognito – Serverless and Security


2021-01-132021-01-13

Securing REST APIs with Amazon Cognito There are of course many access management services and identity providers avail‐ able, including ...


Read MoreRead More

Posts pagination

Previous page Page 1 Page 2 Page 3

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • August 2023
  • June 2023
  • May 2023
  • March 2023
  • January 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • August 2021
  • June 2021
  • May 2021
  • February 2021
  • January 2021

Categories

  • AWS Certification Exam
  • Certifications of Microsoft
  • Cognito and API Gateway
  • Data Encryption Everywhere
  • Security Can Be Simple
  • Zero trust and serverless
Contact Us

Copyright © 2024 glowever.org