11
Choreographing Deployment and Delivery
In Chapter 10, Securing Autonomous Subsystems in Depth, we covered securing our cloud accounts and CI/CD pipelines. We secured the perimeter, the frontend, and our BFF and ESG services. In addition, we redacted sensitive data and saw how the shared responsibility model enables teams to focus their effort on business logic.
We will now turn our attention to the methodology of continuously building, testing, deploying, and delivering functionality to end users. In this chapter, we will focus on the best practices for keeping things from going wrong in the first place. You will learn how to choreograph the continuous deployment and delivery of services and applications with zero downtime and with the confidence ...
Get Software Architecture Patterns for Serverless Systems - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.