Rahul GroverLeverage tag-based Resource Groups to manage egress traffic with Network firewallSecure your environments with tag-based Resource Groups in AWS Network FirewallAug 30, 2023Aug 30, 2023
Rahul GroverDeep dive in Confidential computingThis is first of a multi-part series in Confidential Computing Deep-diveApr 28, 2023Apr 28, 2023
Rahul GroverDeep dive in EventBridge PipesUnderstand EventBridge pipes and where it fits in with a real-world use caseMar 13, 20232Mar 13, 20232
Rahul GroverinSlalom BuildSecuring Access through Attribute based access control (ABAC) in AWSAttribute based access control is a more advanced authorisation strategy where authorisation is based on resource and user attributes.Nov 15, 2022Nov 15, 2022
Rahul GroverCanary deployments @ Lambda in ActionA deployment strategy defines how to create, upgrade or downgrade different versions of an application.Nov 7, 2022Nov 7, 2022