Kontakt: +49 511 59095 – 942

Defenders - caller based EC2 security with CDK

Thumbnail
Defenders: Caller based EC2 security The risk with security credentials is that they get exposed an are beeing used elsewhere. What if we could prevent that the are beeing used elsewhere. The idea from the article of William Bengston from netflix was: Dynamically locking credentials to the environment. This implementation of this idea is much more simple with the cdk. So, let’s defend ourselves! Our story here is the battle of the defenders ™.
Weiterlesen →
Defenders: Caller based EC2 security The risk with security credentials is that they get exposed an are beeing used elsewhere. What if we could prevent that the are beeing used elsewhere. The idea from the article of William Bengston from netflix was: Dynamically locking credentials to the environment. This implementation of this idea is much more simple with the cdk. So, let’s defend ourselves! Our story here is the battle of the defenders ™.
Weiterlesen →

Ruby Layers with Serverless

Thumbnail

Ruby Layers with Serverless

After showing how easy it is to write AWS Lambda functions in Ruby, we will work on a way to build Layers with external dependencies or shared data in this post.

Weiterlesen →

Ruby Layers with Serverless

After showing how easy it is to write AWS Lambda functions in Ruby, we will work on a way to build Layers with external dependencies or shared data in this post.

Weiterlesen →

Ruby Lambdas with Serverless

Thumbnail

Ruby Lambdas with Serverless

Support for Ruby was added on AWS Lambda end of November 2018, with support via the Serverless Framework landing on the same day.

Weiterlesen →

Ruby Lambdas with Serverless

Support for Ruby was added on AWS Lambda end of November 2018, with support via the Serverless Framework landing on the same day.

Weiterlesen →

Automating ACM Certificates with Serverless Framework

Thumbnail
Automating ACM Certificate creation with the Serverless Framework Encryption is the basis for secure communication in our modern world. For most web applications this boils down to using HTTPS to encrypt traffic between the client and server. HTTPS or the underlying protocols TLS/SSL rely on Public Key Infrastructure and Encryption to establish the Authenticity of the communication partner. Authenticity in this context means that the client can be sure he is communicating with Google if they access https://google.
Weiterlesen →
Automating ACM Certificate creation with the Serverless Framework Encryption is the basis for secure communication in our modern world. For most web applications this boils down to using HTTPS to encrypt traffic between the client and server. HTTPS or the underlying protocols TLS/SSL rely on Public Key Infrastructure and Encryption to establish the Authenticity of the communication partner. Authenticity in this context means that the client can be sure he is communicating with Google if they access https://google.
Weiterlesen →

More Tools - CDK Examples

Thumbnail

We need more CDK examples

In this github repo we focus on examples for every day work. While there are some nice examples for the fancy stuff like fargate, ecs and so on in aws-cdk-examples/typescript at master · aws-samples/aws-cdk-examples · GitHub, i felt that basic examples where missing.

So we created GitHub - tecracer/cdk-templates: Templates for aws cdk

Weiterlesen →

We need more CDK examples

In this github repo we focus on examples for every day work. While there are some nice examples for the fancy stuff like fargate, ecs and so on in aws-cdk-examples/typescript at master · aws-samples/aws-cdk-examples · GitHub, i felt that basic examples where missing.

So we created GitHub - tecracer/cdk-templates: Templates for aws cdk

Weiterlesen →