WoodITWork.com

It's about time I let the world know what I was thinking...

Building well-architected serverless applications: Managing application security boundaries – part 2 | Amazon Web Services

Initially published on AWS Compute Blog

This series uses the AWS Well-Architected Tool with the Serverless Lens to help customers build and operate applications using best practices. In each post, I address the nine serverless-specific questions identified by the Serverless Lens along with the recommended best practices. See the introduction post for a table of contents and explanation of the example application. Security question SE…

Read more on AWS Compute Blog