10
Serverless Security, Observability, and Best Practices
In the previous chapter, we saw how various serverless frameworks and automation work and how they deploy an application into production. The next logical step is to look into the post-production aspects of serverless computing, as well as some of the best practices in the serverless application life cycle.
Security is an important aspect of any running application. Software applications are susceptible to several security vulnerabilities. The more complex the application, the more attack surfaces it will have. This is why the cybersecurity landscape is so vast and diverse. In traditional application security, threats impact various layers of our application infrastructure, starting from ...
Get Architecting Cloud-Native Serverless Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.