Security
Security is a key concern, independent of the architecture of the application, and serverless is no exception. Since we are creating functions as services in the cloud, we need to take care in our authentication, authorization of execution, and the OWASP. However, in this context, the cloud provider—such as AWS or Azure—provides us with guides and practices out of the box, in order to minimize our concerns.
Another security concern to consider in serverless is the lack of a clearly shaped security perimeter. In other words, when the security perimeter of one of the functions ends and another starts, different cloud providers provide different ways to make those functions work as a whole; for example, AWS does this by using a service ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access