AWS Compute Blog

Category: Security, Identity, & Compliance*

Serverless Automated Cost Controls, Part1

This post courtesy of Shankar Ramachandran, Pubali Sen, and George Mao In line with AWS’s continual efforts to reduce costs for customers, this series focuses on how customers can build serverless automated cost controls. This post provides an architecture blueprint and a sample implementation to prevent budget overruns. This solution uses the following AWS products: […]

Read More

Automating Security Group Updates with AWS Lambda

Customers often use public endpoints to perform cross-region replication or other application layer communication to remote regions. But a common problem is how do you protect these endpoints? It can be tempting to open up the security groups to the world due to the complexity of keeping security groups in sync across regions with a […]

Read More

Using Enhanced Request Authorizers in Amazon API Gateway

Recently, AWS introduced a new type of authorizer in Amazon API Gateway, enhanced request authorizers. Previously, custom authorizers received only the bearer token included in the request and the ARN of the API Gateway method being called. Enhanced request authorizers receive all of the headers, query string, and path parameters as well as the request […]

Read More

Automate Your IT Operations Using AWS Step Functions and Amazon CloudWatch Events

Rob Percival, Associate Solutions Architect Are you interested in reducing the operational overhead of your AWS Cloud infrastructure? One way to achieve this is to automate the response to operational events for resources in your AWS account. Amazon CloudWatch Events provides a near real-time stream of system events that describe the changes and notifications for […]

Read More