Week 3
Week 3 at Strastan
This week was all about locking down our backend authentication, authorization, and event orchestration took center stage. We worked from the school’s computer lab since our usual rooms were reserved for graduation prep, but that didn’t slow us down.
We finalized the Cognito User Pool setup and wired in Lambda functions for sign-up and user retrieval. The authorizer was integrated to guard protected routes, and CDK deployments finally hit zero remaining tasks. From there, we refined the registration flow to encrypt user profiles post-confirmation and validated everything through Postman.
Midweek, we shifted focus to IAM roles and EventBridge. Each Lambda was scoped with least-privilege permissions, and we spun up a custom event bus with filtering rules to ensure only trusted events were processed. CORS policies were enforced, and API Gateway endpoints were hardened to reject unauthorized requests.
By Friday, we had a fully secured backend: tokens were validated, routes were protected, and logs confirmed everything was behaving as expected. Final touches included CORS headers and a full audit of EventBridge activity.
Reflections & Challenges
Securing a cloud backend isn’t just about writing code it’s about understanding how every piece fits together. IAM roles, token validation, and event filtering all require precision and patience. This week taught me how to think like a security architect while still moving fast as a developer. It’s satisfying to know our backend isn’t just functional it’s fortified.
Comments
Post a Comment