In this chapter, we will get a brief overview of security in AWS to ensure that your serverless microservices are secure. Before we create our first microservice, we first need to understand the AWS security models. We're going to discuss different terms that are important and the overall AWS security model. We are then going to talk about IAM, which is used to access any of the AWS resources. Finally, we'll look at securing your serverless microservice.
We will cover the following topics in this chapter:
- Overview of the security in AWS
- Overview of AWS Identity and Access Management (IAM)
- Securing your serverless microservice