Book Image

Building Serverless Microservices in Python

By : Richard Takashi Freeman
Book Image

Building Serverless Microservices in Python

By: Richard Takashi Freeman

Overview of this book

Over the last few years, there has been a massive shift from monolithic architecture to microservices, thanks to their small and independent deployments that allow increased flexibility and agile delivery. Traditionally, virtual machines and containers were the principal mediums for deploying microservices, but they involved a lot of operational effort, configuration, and maintenance. More recently, serverless computing has gained popularity due to its built-in autoscaling abilities, reduced operational costs, and increased productivity. Building Serverless Microservices in Python begins by introducing you to serverless microservice structures. You will then learn how to create your first serverless data API and test your microservice. Moving on, you'll delve into data management and work with serverless patterns. Finally, the book introduces you to the importance of securing microservices. By the end of the book, you will have gained the skills you need to combine microservices with serverless computing, making their deployment much easier thanks to the cloud provider managing the servers and capacity planning.
Table of Contents (13 chapters)
Title Page
Dedication

Overview of the security in AWS

In this section, we are going to provide an overview of the security in AWS. We are going to take a look at why security is important, provide some examples of security, discuss the types of security terms that are important, and talk about the AWS shared-responsibility model.

Why is security important?

The following points discuss the importance of security:

  • Compliance with the law and standards: For example, the European Union General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA) adopted by the US are responsible for regulating the laws for data protection and privacy for all individuals.
  • Data integrity: Systems that aren't secure could...