Using EKS access policy to manage EKS cluster access
Using AWS KMS to decrypt JWT
Using AWS KMS to sign and verify JWT
Using AWS SAM framework to develop Lambda applications
An automated approach to developing and testing AWS lambda functions locally
How to setup a CDN with private S3 bucket
Using AWS S3 to store artifacts and savepoints
How to extract security credentials from IAM Role