Learn how hackers exploit vulnerable cloud applications in practice, and how AWS' security services detect the vulnarabilities and malicious activities.
AWS Lambda vulnerabilities stem from configuration mistakes, bad programming, and vulnerabilities in dependencies. To manage vulnerabilities, start scanning and patching more.
Learn how to separate your authorization logic from the application logic and how to integrate AVP with other AWS services.
Learn the strategies for integrating Amazon Verified Permissions into your application with Amazon API Gateway or Amazon AppSync.
Learn how to utilize Amazon Verified Permissions with Amazon Cognito to authorize calls with JWT tokens.
Dive into a complete working architecture utilizing multiple AWS services: Amazon Verified Permissions, Amazon Cognito, Amazon AppSync and Amazon DynamoDB.
Get familiar with Amazon Verified Permissions' auditing capabilities and integrate AVP with AWS CloudTrail.
In this article, we will dive into data encryption practices, and demonstrate how modern cloud-era encryption with AWS Key Management Service works.
The number of IaC tools has grown significantly over the years. What new tools do better than the old ones? What are they suitable for, what not?