We want to prevent unauthorized access and use of information. Additionally, we want to ensure that the application or service works as intended and only as intended. Another advantage of serverless is that we are working in a SaaS model where security is almost entirely the cloud provider's responsibility (in the shared responsibility model).
Securing serverless applications comprise three components: AWS services, application code, and data flows.
The following are the steps you need to perform for serverless security:
- What data is involved in the app? Map out the data ...