Summary
In this chapter, we learned about the security best practices that will protect your serverless applications. We also looked at the services that cloud vendors offer for the observability of your serverless applications. Finally, we looked at the most common best practices that will help you to design and develop your serverless web applications better.
In the next chapter, we will look into some of the common architecture patterns and serverless solutions.