Since most Lambda function code contains multiple third-party Go dependencies (remember the go get commands), it's important to carry out audits for all of these. Hence, vulnerability scanning your Golang dependencies should be part of your CI/CD. You must automate the security analysis using a third-party tool such as Snyk (https://snyk.io/) to continuously scan for known security vulnerabilities in dependencies. The following screenshot describe a complete end-to-end deployment process that you might choose to implement for your Lambda functions:
By making vulnerability scanning part of your workflow, you will be capable of finding and fixing known vulnerabilities in packages which could potentially cause data loss, service outages, and unauthorised access to sensitive information.
In addition, application best practices can...