Securing the perimeter
Security-in-depth is a layered approach where each additional layer provides more measures that an intruder must penetrate before gaining access to the valuable data within a system. In Chapter 6, A Best Friend for the Frontend, we covered the BFF pattern and in Chapter 7, Bridging Intersystem Gaps, we covered the ESG pattern. These services represent the boundary of the system because they support external actors. Before requests reach these services, we want them to pass through a hardened perimeter that helps weed on illegitimate requests before they can have a negative impact on the system. Fortunately, for our serverless systems, this is an area where the cloud provider's global resources provide an amazing level of scalability and protection. Let's look at how we can leverage global/edge infrastructure, federated identity providers and encrypt data in transit.You can find a template for global resources used across a subsystem here: https://github...