Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Event producers and event publishing best practices Event producers are applications that create and publish events. As you develop on ...
Cognito and API Gateway Cognito authorizers provide a fully managed access control integration with API Gateway, as illustrated in Figure ...
Encrypted and verifiable messages with JSON Web Tokens You can use JWT as your message transport protocol. To sign and ...
Data Encryption Everywhere As you develop and operate your serverless application, you will discover both the power and the challenges ...
Encryption in transit Data is in transit in a serverless application as it moves from service to service. All AWS ...
Uses for event sourcing Although early thoughts on event sourcing focused on the ability to re-create the current state of ...
Architectural considerations for event sourcing At a high level, the concept of event sourcing is simple—but its implementation requires careful ...
The importance of EventStorming in serverless development EventStorming is a great way to collaborate and to learn about business requirements, ...
Security Can Be Simple Given the stakes, ensuring the security of a software application can be a daunting task. Breaches ...
The Power of AWS IAM AWS IAM is the one service you will use everywhere—but it’s also often seen as ...