Uses for event sourcing Although early thoughts on event sourcing focused on the ability to re-create the current state of ...
Uses for event sourcing Although early thoughts on event sourcing focused on the ability to re-create the current state of ...
Architectural considerations for event sourcing At a high level, the concept of event sourcing is simple—but its implementation requires careful ...
EventStorming One of the classic problems in software engineering is balancing what’s in the requirements, and what gets implemented and ...
The importance of EventStorming in serverless development EventStorming is a great way to collaborate and to learn about business requirements, ...
Security Can Be Simple Given the stakes, ensuring the security of a software application can be a daunting task. Breaches ...
Getting Started Establishing a solid foundation for your serverless security practice is pivotal. Secu‐ rity can, and must, be a ...
Combining the Zero Trust Security Model with Least Privilege Permissions There are two modern cybersecurity principles that you can leverage ...
Zero trust and serverless Zero trust is often touted as the next big thing in network security. Buzzwords and hype ...
The Power of AWS IAM AWS IAM is the one service you will use everywhere—but it’s also often seen as ...
Lambda execution roles A key use of IAM roles in serverless applications is Lambda function execution roles. An execution role ...