Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Cognito and API Gateway Cognito authorizers provide a fully managed access control integration with API Gateway, as illustrated in Figure ...
Lambda authorizers Lambda functions with custom authorization logic can be attached to API Gateway HTTP API routes and invoked whenever ...
Validating and Verifying API Requests There are other ways to protect your serverless API beyond the access control mecha‐ nisms ...
Message Verification in Event-Driven Architectures Most of the access control techniques we’ve explored generally apply to synchronous, request/response APIs. But ...
Encrypted and verifiable messages with JSON Web Tokens You can use JWT as your message transport protocol. To sign and ...
Data Encryption Everywhere As you develop and operate your serverless application, you will discover both the power and the challenges ...
Encryption in transit Data is in transit in a serverless application as it moves from service to service. All AWS ...
Event consumers and event consumption best practices Event consumers are applications on the receiving end. They set up subscription policies ...
The Importance of Event Sourcing in Serverless Development Event sourcing is a way of capturing and persisting the changes happening ...