-
Book Overview & Buying
-
Table Of Contents
Cloud Security Handbook - Second Edition
By :
In the previous chapter, we learned about security in containers and Kubernetes.
This chapter will cover serverless computing or function as a service (FaaS) and provide you with best practices on how to securely deploy and manage each of them.
Although there are many cloud-managed services (such as object storage, API gateways, load balancers, etc.) that are considered serverless, in this section, I will present the most common serverless computing services/FaaS. Following that, we are going to see what the best practices are for securing common FaaS deployments from AWS, Azure, and GCP. For each of these platforms, we will review best practices for securing FaaS from different angles (from IAM to network access, auditing, monitoring, and finally compliance).
In this chapter, we will cover the following topics: