This is an operator-focused checklist for safe deployments. It does not replace your organization’s security review, but it captures the Lesser-specific “gotchas” and safe defaults.
- Treat
--out <path>outputs fromlesser upas sensitive; store them with0600permissions and back them up securely. - Don’t commit
.env,tmp/, or any generated credentials.
✅ CORRECT: store ~/.lesser/<app>/<base-domain>/bootstrap.json in an encrypted secret store or password manager vault.
❌ INCORRECT: paste the mnemonic into a shared Slack channel for “safe keeping”.
- Use least-privilege IAM for humans and CI (separate deploy role from read-only).
- Keep Route53 + ACM validation in the same account as the deployment where possible.
- Rate limiting is enabled by default; use
DISABLE_RATE_LIMITING/DISABLE_FEDERATION_RATE_LIMITINGonly for controlled debugging (seedocs/configuration.md). - AWS WAF is not provisioned by default; add it in CDK if you need WAF-level protections.
Lesser is designed to support multi-tenant deployments. If you run multiple instances:
- Keep per-tenant domains and credentials isolated.
- Avoid cross-tenant access in operational tooling (logs/metrics).
- Use separate AWS accounts if you need hard isolation boundaries.
-
Tail API logs:
./lesser logs --app <app> --function api --env dev --aws-profile <profile>
-
Runbook:
docs/operations/runbook.md