4.
Serverless Computing in a nutshellServerless Computing in a nutshell No servers to provision or manage Scales with usage Never pay for idle Built-in availability and fault tolerance
7.
OWASP Top 10 mapped to security domainsOWASP Top 10 mapped to security domains Infrastructure Data Code Identity & Access Logging & Monitoring Broken Authentication(#2) Broken Access Control (#5) Injection (#1) XXE (#4) XSS (#7) Insecure Deserialization (#8) Using Components with Known Vulnerabilities (#9) Sensitive Data Exposure (#3) Using Components with Known Vulnerabilities (#9) Security Misconfiguration (#6) Insufficient Logging & Monitoring (#10)
15.
3rd party API: Unicorn customization3rd party API: Unicorn customization List customization options and prices: GET /capes GET /glasses GET /horns GET /socks Image Credit: Smashicons, Freepik from www.flaticon.com johnny_automatic from www.openclipart.org
16.
3rd party API: Unicorn customization3rd party API: Unicorn customization Create and manage customizations POST /customizations GET /customizations GET /customizations/{id} DELETE /customizations/{id}
18.
Workshop architecture – starting point Workshop architecture – starting point Amazon API Gateway AWS Lambda Amazon RDS 3rd party Not secure! Deployed using SAM (Serverless Application Model )
Thank you for your comment.