Best of AWS re:Invent
2020Zero Trust: An AWS perspective – Quint Van DemanTen easy and effective ways to secure your AWS environment – Becky WeissSecurity best practices the AWS Well-Architected way – Ben Potter2019CI/CD for serverless
Architecting Secure Software | Building with Rust | Automating LLM Flows | Embedded Future
2020Zero Trust: An AWS perspective – Quint Van DemanTen easy and effective ways to secure your AWS environment – Becky WeissSecurity best practices the AWS Well-Architected way – Ben Potter2019CI/CD for serverless
AWS Well-Architected FrameworkDesign PrinciplesAWS...Cost OptimizationCost OptimizationPerformance EfficiencyPerformance Effi...OperationalExcellenceOperational...SecuritySecurityReliabilityReliabilityPerform OperationsAs CodePerform Operations...Annotate Documentation Annotate Documen...Make Frequent, Small Reversible ChangesMake Frequent, S...Refine Operations Procedures FrequentlyRefine Operations
Selected talks from AWS: Reinforce on cloud security, identity, and compliance – I'll be adding new talks as I consume them