Skip to content

Software Architecture for Building Serverless Microservices

Close Menu

Event producers and event publishing best practices – Software Architecture for Building Serverless MicroservicesEvent producers and event publishing best practices – Software Architecture for Building Serverless Microservices


2024-08-132024-08-13

Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...


Read MoreRead More

Cognito and API Gateway – Serverless and SecurityCognito and API Gateway – Serverless and Security


2024-07-252024-07-25

Cognito and API Gateway Cognito authorizers provide a fully managed access control integration with API Gateway, as illustrated in Figure ...


Read MoreRead More

Lambda authorizers – Serverless and SecurityLambda authorizers – Serverless and Security


2024-06-132024-06-13

Lambda authorizers Lambda functions with custom authorization logic can be attached to API Gateway HTTP API routes and invoked whenever ...


Read MoreRead More

Validating and Verifying API Requests – Serverless and SecurityValidating and Verifying API Requests – Serverless and Security


2024-05-192024-05-19

Validating and Verifying API Requests There are other ways to protect your serverless API beyond the access control mecha‐ nisms ...


Read MoreRead More

Message Verification in Event-Driven Architectures – Serverless and SecurityMessage Verification in Event-Driven Architectures – Serverless and Security


2024-04-182024-04-18

Message Verification in Event-Driven Architectures Most of the access control techniques we’ve explored generally apply to synchronous, request/response APIs. But ...


Read MoreRead More

Encrypted and verifiable messages with JSON Web Tokens – Serverless and SecurityEncrypted and verifiable messages with JSON Web Tokens – Serverless and Security


2024-03-052024-03-05

Encrypted and verifiable messages with JSON Web Tokens You can use JWT as your message transport protocol. To sign and ...


Read MoreRead More

Data Encryption Everywhere – Serverless and SecurityData Encryption Everywhere – Serverless and Security


2024-02-132024-02-13

Data Encryption Everywhere As you develop and operate your serverless application, you will discover both the power and the challenges ...


Read MoreRead More

Encryption in transit – Serverless and SecurityEncryption in transit – Serverless and Security


2024-01-132024-01-13

Encryption in transit Data is in transit in a serverless application as it moves from service to service. All AWS ...


Read MoreRead More

Event consumers and event consumption best practices – Software Architecture for Building Serverless MicroservicesEvent consumers and event consumption best practices – Software Architecture for Building Serverless Microservices


2023-12-152023-12-15

Event consumers and event consumption best practices Event consumers are applications on the receiving end. They set up subscription policies ...


Read MoreRead More

The Importance of Event Sourcing in Serverless Development – Software Architecture for Building Serverless MicroservicesThe Importance of Event Sourcing in Serverless Development – Software Architecture for Building Serverless Microservices


2023-11-122023-11-12

The Importance of Event Sourcing in Serverless Development Event sourcing is a way of capturing and persisting the changes happening ...


Read MoreRead More

Posts pagination

Page 1 Page 2 Page 3 Next page

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • August 2023
  • June 2023
  • May 2023
  • March 2023
  • January 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • August 2021
  • June 2021
  • May 2021
  • February 2021
  • January 2021

Categories

  • AWS Certification Exam
  • Certifications of Microsoft
  • Cognito and API Gateway
  • Data Encryption Everywhere
  • Security Can Be Simple
  • Zero trust and serverless
Contact Us

Copyright © 2024 glowever.org