Previous Item
Securing Serverless Applications - slides
Securing Serverless Applications - slides

Next Item
Scaling IAM permissions with attribute based access control
Scaling IAM permissions with attribute based access control