7

Implementing Security for Serverless Deployments

Welcome to the seventh chapter of our comprehensive guide on AWS security. In this chapter, we will focus on serverless computing and its unique impact on security within AWS environments. We aim to equip you with the knowledge and skills needed to navigate the distinct security landscape presented by serverless architectures. we will begin by demystifying serverless computing, exploring its benefits, challenges, and how it compares to traditional microservices. Next, we will delve into the function-based design paradigm, focusing on the granularity and composition of serverless functions, along with their inherent stateless nature.

As we progress, we will bring the concept of event-driven communication ...

Get Mastering AWS Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.