Stackery's deployment pipeline is now available to all users.
Information security (infosec) is a broad field. Its practitioners behave more like artists than engineers, and the array of possibilities leading to infosec failure are vast.
The memes around serverless are endless, generally involving how there are no servers, no operations teams, and how unicorns will use their magical horns to solve your application stability problems.
Introducing stack.new to audit and visualize CloudFormation templates for best practices.
In this guide we'll take a look at the basics of IAM policies, just enough to understand best practices, and then look at some of the tools available to help us validate that our permissions follow best practices to secure our resources.