AWS Compute Blog

Category: AWS CloudTrail

Secrets Manager password change

Building well-architected serverless applications: Implementing application workload security – part 2

This series of blog posts uses the AWS Well-Architected Tool with the Serverless Lens to help customers build and operate applications using best practices. In each post, I address the serverless-specific questions identified by the Serverless Lens along with the recommended best practices. See the introduction post for a table of contents and explanation of the example application. Security question SEC3: […]

Read More
IAM last used

Building well-architected serverless applications: Managing application security boundaries – part 2

This series uses the AWS Well-Architected Tool with the Serverless Lens to help customers build and operate applications using best practices. In each post, I address the nine serverless-specific questions identified by the Serverless Lens along with the recommended best practices. See the introduction post for a table of contents and explanation of the example application. Security question SEC2: How do […]

Read More
Multiple buckets with multiple Lambda subscribers

Using dynamic Amazon S3 event handling with Amazon EventBridge

The standard S3 to Lambda integration enables developers to deploy code that responds to bucket- or object-based events. Using Amazon EventBridge, you can employ even more sophisticated routing and filtering of events between S3 and Lambda.

Read More
Decoupled architecture

Decoupling larger applications with Amazon EventBridge

This blog post shows how you can use an event-based architecture to decouple services and functional areas of applications. It uses the document repository solution as an example, to compare architecture after shifting to an event-based approach.

Read More