Open in app

Sign in

Write

Sign in

Ben Kehoe
Ben Kehoe

2.1K followers

Home

About

The Meaning(lessness) of Serverless

“Serverless” as a term is close to meaningless, and it’s not useful to argue about the definition. So how should we talk about it today?

Mar 14, 2023
2
Mar 14, 2023
2

The “End of Programming” will look a lot like programming

Nobody wants “temperamental and mysterious” products, so what will AI-integrated software development look like?

Jan 2, 2023
5
Jan 2, 2023
5

AWS IAM Permissions Boundaries Are Incomplete Without Propagation

Permissions boundaries are mostly unusable for organizations where developers need to create IAM principals as part of their normal process

Oct 29, 2021
4
Oct 29, 2021
4

Cross-account role trust policies should trust AWS accounts, not roles, part 2

Further details on privilege escalation for cross-account role assumption

Oct 22, 2021
1
Cross-account role trust policies should trust AWS accounts, not roles, part 2
Cross-account role trust policies should trust AWS accounts, not roles, part 2
Oct 22, 2021
1

Cross-account role trust policies should trust AWS accounts, not roles

Your role’s trust policy should be representative of the security boundary and not give a false sense of security.

Oct 13, 2021
1
Cross-account role trust policies should trust AWS accounts, not roles
Cross-account role trust policies should trust AWS accounts, not roles
Oct 13, 2021
1

Never put AWS temporary credentials in env vars or credentials files — there’s a better way

Please, I’m begging you — learn about how the AWS CLI and SDK retrieve and refresh credentials. There are such good options!

Oct 6, 2021
11
Oct 6, 2021
11

AWS IAM Permission Boundaries Has A Caveat That May Surprise You

Resource policies can unilaterally grant access, even if it isn’t within the permissions boundary

Sep 29, 2021
Resource policies can short-circuit the evaluation before the permissions boundary is evaluated
Resource policies can short-circuit the evaluation before the permissions boundary is evaluated
Sep 29, 2021

I Trust AWS IAM to Secure My Applications. I Don’t Trust the IAM Docs to Tell Me How.

We need better AWS IAM documentation so that we can confidently and successfully use the extensive power of IAM to gain the security we…

Sep 22, 2021
Sep 22, 2021

Principals in AWS IAM

This article explains the basics of AWS authentication: the way you gain an identity that you can use to access AWS services

Sep 8, 2021
3
Sep 8, 2021
3

Python multi-line string literals with textwrap.dedent()

Line continuations should be avoided in code, but are useful in this case!

Aug 25, 2021
Aug 25, 2021
Ben Kehoe

Ben Kehoe

2.1K followers

AWS Serverless Hero

Following
  • The Medium Blog

    The Medium Blog

  • Cory Doctorow

    Cory Doctorow

  • Jess Trochet

    Jess Trochet

  • lifadev

    lifadev

  • Vendia Blog

    Vendia Blog

See all (207)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech