Serverless Security

Serverless security addresses the unique challenges of protecting applications and data within a serverless computing architecture, operating under a shared responsibility model where the cloud provider secures the underlying infrastructure. The developer's focus shifts from securing servers to securing the application code itself, its configurations, and its permissions at a granular, function-by-function level. This involves practices such as writing secure, vulnerability-free functions to prevent injection attacks, enforcing the principle of least privilege through tightly scoped identity and access management (IAM) roles, vetting third-party dependencies, and properly configuring event triggers like API gateways to protect against unauthorized access and invocation.

1.

1.1.

1.1.1.

1.1.1.1.

1.1.1.2.

1.1.1.3.

1.1.1.4.

1.1.2.

1.1.2.1.

1.1.2.2.

1.1.2.3.

1.1.2.4.

1.1.3.

1.1.3.1.

1.1.3.2.

1.1.3.3.

1.1.3.4.

1.2.

1.2.1.

1.2.1.1.

1.2.1.2.

1.2.1.3.

1.2.1.4.

1.2.1.5.

1.2.2.

1.2.2.1.

1.2.2.2.

1.2.2.3.

1.2.2.4.

1.2.2.5.

1.2.2.6.

1.2.3.

1.2.3.1.

1.2.3.2.

1.2.3.3.

1.3.

1.3.1.

1.3.1.1.

1.3.1.2.

1.3.1.3.

1.3.2.

1.3.2.1.

1.3.2.2.

1.3.2.3.

1.3.3.

1.3.3.1.

1.3.3.2.

1.3.3.3.

1.3.4.

1.3.4.1.

1.3.4.2.

1.3.4.3.

1.3.5.

1.3.5.1.

1.3.5.2.

1.3.5.3.

1.4.

1.4.1.

1.4.2.

1.4.3.

1.4.4.