In this chapter, we will discuss how to finalize the risk assessment we started in Chapter 2 to present it to our business stakeholders.
Collecting All the Findings
In Chapter 2, we discussed how to prepare a risk assessment. It is the first technical chapter because it laid the foundation for addressing security in our serverless application. Reviewing the documentation, inspecting the source code, understanding the architecture, becoming acquainted with the application, and quantifying the threats prepared us in performing the risk assessment. Without understanding the uniqueness ...