🤔 Since we know the set of domain events a command should produce we could use IAM policy conditions for fine grained (write) access control to the event store...
I'm sure there are many similar instances where we could follow "principle of least privilege".
🤔 Since we know the set of domain events a command should produce we could use IAM policy conditions for fine grained (write) access control to the event store...
I'm sure there are many similar instances where we could follow "principle of least privilege".