Book Image

Software Architecture Patterns for Serverless Systems - Second Edition

By : John Gilbert
Book Image

Software Architecture Patterns for Serverless Systems - Second Edition

By: John Gilbert

Overview of this book

Organizations undergoing digital transformation rely on IT professionals to design systems to keep up with the rate of change while maintaining stability. With this edition, enriched with more real-world examples, you’ll be perfectly equipped to architect the future for unparalleled innovation. This book guides through the architectural patterns that power enterprise-grade software systems while exploring key architectural elements (such as events-driven microservices, and micro frontends) and learning how to implement anti-fragile systems. First, you'll divide up a system and define boundaries so that your teams can work autonomously and accelerate innovation. You'll cover the low-level event and data patterns that support the entire architecture while getting up and running with the different autonomous service design patterns. This edition is tailored with several new topics on security, observability, and multi-regional deployment. It focuses on best practices for security, reliability, testability, observability, and performance. You'll be exploring the methodologies of continuous experimentation, deployment, and delivery before delving into some final thoughts on how to start making progress. By the end of this book, you'll be able to architect your own event-driven, serverless systems that are ready to adapt and change.
Table of Contents (16 chapters)
Other Books You May Enjoy

Securing cloud accounts

Securing our cloud accounts is not the first thing we usually think about when we think about security. We usually think about the application security topics we will cover in the later sections of this chapter, such as authentication, authorization, and encryption. But if you step back and think about it, all our autonomous services run in our cloud accounts. So, if we do not focus first on securing our cloud accounts, then we have essentially just secured the front door and have left the back door wide open for attack.

There was a story that I read in 2014 about a security breach at a company named Code Spaces that drove home to me the importance of securing our cloud accounts. If you have never heard of this company, it is because the breach put it out of business. A hacker took their cloud account for ransom and when the company fought back, the hacker deleted everything in the account, including the backups, which were housed in the same account.