Serverless Security, Observability, and Best Practices
In the previous chapter, we saw how various serverless frameworks and automation work and how they deploy an application into production. The next logical step is to look into the post-production aspects of serverless computing, as well as some of the best practices in the serverless application life cycle.
Security is an important aspect of any running application. Software applications are susceptible to several security vulnerabilities. The more complex the application, the more attack surfaces it will have. This is why the cybersecurity landscape is so vast and diverse. In traditional application security, threats impact various layers of our application infrastructure, starting from the network, going through servers, and all the way up to the application. This is because a traditional application is hosted in a physical server within a data center premises. Since the entire infrastructure is owned by the application/business...