

# Further reading
Further reading

 For additional information, refer to: 
+  [Amazon API Gateway Pricing](https://aws.amazon.com/api-gateway/pricing/) 
+  [AWS PrivateLink Pricing](https://aws.amazon.com/privatelink/pricing/) 
+  [Amazon API Gateway Resource Policies](https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-resource-policies.html) 
+  [AWS Well-Architected](https://aws.amazon.com/architecture/well-architected/?wa-lens-whitepapers.sort-by=item.additionalFields.sortDate&wa-lens-whitepapers.sort-order=desc) 
+  [AWS Well-Architected Framework](https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html) 
+  [https://docs.aws.amazon.com/wellarchitected/latest/serverless-applications-lens/welcome.html](https://docs.aws.amazon.com/wellarchitected/latest/serverless-applications-lens/welcome.html) (whitepaper) 
+  [https://docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-best-practices-ddos-resiliency.pdf](https://docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-best-practices-ddos-resiliency.pdf) (whitepaper) 
+  [Protecting your API using Amazon API Gateway and AWS WAF](https://aws.amazon.com/blogs/compute/protecting-your-api-using-amazon-api-gateway-and-aws-waf-part-i/) (blog) 
+  [https://docs.aws.amazon.com/whitepapers/latest/guidelines-for-implementing-aws-waf/guidelines-for-implementing-aws-waf.html](https://docs.aws.amazon.com/whitepapers/latest/guidelines-for-implementing-aws-waf/guidelines-for-implementing-aws-waf.html) (whitepaper) 
+  [OWASP Top Ten Web Application Security Risks](https://owasp.org/Top10/) web application security risks 
+  [AWS Artifact](https://aws.amazon.com/artifact/) 