Useful Links
Computer Science
Cloud Computing
Serverless Technologies
1. Introduction to Serverless Computing
2. Core Concepts and Architecture
3. Functions as a Service In-Depth
4. Major Serverless Platforms
5. Developing and Deploying Serverless Applications
6. Serverless Architectural Patterns
7. Observability in Serverless Systems
8. Security Considerations
9. Advanced Topics and Challenges
10. The Future of Serverless
Security Considerations
The Shared Responsibility Model in Serverless
Provider vs. Customer Responsibilities
Security Boundaries
Identity and Access Management
Principle of Least Privilege
Minimizing Permissions
Role-Based Access Control
Function Execution Roles
Assigning Roles to Functions
Temporary Credentials
Securing Function Code
Dependency Scanning
Vulnerability Detection
Automated Scanning Tools
Static Application Security Testing
Code Analysis Techniques
Integration with CI/CD
Securing Event Sources
API Gateway Security
Authentication Mechanisms
Authorization Policies
Event Injection Attacks
Input Validation
Event Source Filtering
Managing Secrets and Configuration
Environment Variables vs. Secrets Managers
Secure Storage of Secrets
Rotation and Auditing
Network Security
Virtual Private Cloud Integration
Private Network Access
Subnet Configuration
Egress and Ingress Controls
Restricting Outbound and Inbound Traffic
Firewall Rules
Previous
7. Observability in Serverless Systems
Go to top
Next
9. Advanced Topics and Challenges