The main problem is this: By using tags for authorisation, you have a multitude of completely new - per-service - actions that can be used to compromise your security posture.
Recently I've been working with Step Functions in my day-to-day work, as well as in my personal projects, and I decided to write this post as a way of articulating the ins-and-outs of Step Functions I've learnt while using them.
Understanding the differences between the various event types and their retries is important, because it will change how you design and code your application. If you're developing a serverless application in Lambda, you will have to deal with retries. They
With so much buzz around serverless at re:Invent 2017, I thought it would be a good time to highlight the best places and resources to find AWS-specific serverless information: AWS re:Invent 2017 Serverless Breakout Sessions on YouTube This
UPDATED: Added examples from submissions. I love seeing real-world serverless applications. This post is a collection of the best examples, break-downs, and deep-dive articles and videos I've come across recently: MyCrypto.tools is a nice write-up on all the components
Subscribe to Rowan Udell
Subscribe today and get access to a private newsletter and new content every week!