© Miguel A. Calles 2020
M. A. CallesServerless Securityhttps://doi.org/10.1007/978-1-4842-6100-2_13

13. Finalizing the Risk Assessment

Miguel A. Calles1 
(1)
La Habra, CA, USA
 

In this chapter, we will discuss how to finalize the risk assessment we started in Chapter 2 to present it to our business stakeholders.

Collecting All the Findings

In Chapter 2, we discussed how to prepare a risk assessment. It is the first technical chapter because it laid the foundation for addressing security in our serverless application. Reviewing the documentation, inspecting the source code, understanding the architecture, becoming acquainted with the application, and quantifying the threats prepared us in performing the risk assessment. Without understanding the uniqueness ...

Get Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.