Circles App – Secure SDLC Walkthrough In Progress

Circles AWS Architecture Diagram
Click to open the full-size Circles AWS architecture diagram in a new tab.

A real example of how I approach product vision, UX design, cloud architecture, security, and delivery management – using a small but fully deployable serverless app.

← Back to portfolio home

Live demo: circles.behrens-hub.com

1. Product Vision

Circles started as a simple idea: help families and close-knit groups strengthen real-world relationships with less friction. The concept is a lightweight, privacy-respecting space for sharing messages, notes, and reminders inside small "circles" – without the noise and manipulation of large social platforms.

At the same time, I wanted Circles to serve as a concrete demonstration of how I approach modern cloud-native product delivery: from vision and requirements, through architecture and security, to incremental, cost-aware implementation on AWS.

2. Requirements & Discovery

I started with structured discovery: who is this for, what problems does it solve, and what is the smallest version that still feels meaningful? Even though the current demo focuses on messaging, the underlying idea is broader: helping people maintain relational rhythm in a healthy, human-centered way.

Requirements were grouped into three buckets:

Artifact: Requirements decomposition document (coming soon)

3. User Journey Mapping

Before writing code, I mapped the key user journeys to understand emotional flow, friction points, and what "success" looks like from a human perspective. Even for a small demo, this keeps the technical work anchored in real behavior.

4. Wireframes & UX Flow

I sketched low-fidelity wireframes to validate navigation and interaction patterns before touching the backend. The current UI is intentionally simple: a clean layout that shows the signed-in user, the current circle, and a chronological list of messages with author and timestamp.

Even in this minimal version, I paid attention to clarity: the user can see if they are signed in, which circle they are viewing, and what action they can take next.

5. Architecture & Secure Design

Under the hood, Circles is a fully serverless, cloud-native application designed for low cost, low operational overhead, and a clear path to scale. The architecture emphasizes identity, authorization, and clean separation of concerns.

The result is a small but realistic production-style environment: private data stores, a hardened public surface, and a clean identity and authorization model.

6. Infrastructure as Code (IaC)

All infrastructure for Circles is defined using AWS CDK (TypeScript) and deployed via CloudFormation. This includes:

This approach keeps the system reproducible, reviewable, and versioned. It also provides a natural place to embed secure defaults (e.g., private buckets, HTTPS only, no public write access to data stores).

7. Backlog, Planning & Roadmap

I treated Circles like any product: the vision was translated into a structured backlog and a sequence of increments that could deliver value while validating the architecture. The roadmap emphasized:

Planning also explicitly considered cost and re-architecture. It was more valuable to build a lean, correct MVP on serverless primitives than to overbuild a complex stack “just in case.” The design intentionally leaves a clean path to evolve if usage ever justifies it.

8. Incremental Delivery & Early Value

Rather than trying to build “the whole product,” I delivered a series of small, testable increments. Each step added real capability and also validated a piece of the architecture or security model.

Key increments included:

Each increment was small enough to validate quickly, but significant enough to demonstrate that the underlying approach was sound.

At a roadmap level, I track these increments in a simple Done / Next / Later view, which keeps the work visible without locking the implementation into a rigid Gantt chart.

Circles incremental delivery roadmap
Click to open the full roadmap image in a new tab.

9. Secure SDLC & Ongoing Improvement

Security wasn’t treated as a separate phase; it was layered in as the system matured. My goal was to apply the right level of security at each stage, rather than over-engineering up front.

Conceptually, the secure SDLC for Circles followed these stages:

This pattern mirrors how I’d evolve security in a larger product: start with strong defaults, layer in identity and authorization as first-class concepts, and then deepen the controls as value, usage, and risk increase.

10. Summary

Circles is intentionally small, but it reflects the same principles I bring to large-scale initiatives: clear vision, structured discovery, disciplined architecture, secure-by-default design, cost-aware delivery, and iterative improvement. The result is a working, production-style application that can be extended into a richer product or simply used as a transparent example of how I think and work.

For hiring managers, this project is a tangible view into how I translate strategy into architecture, and architecture into running software – while balancing usability, security, and cost.