Finally, in this chapter, we will introduce the concept of least privilege with regard to Identity Access Management (IAM) and explain how to apply this to Cloud Functions. We will look at some approaches that can secure an application using Cloud Functions.
Later in this chapter, we will discuss service accounts; however, let's take an initial brief look at how to restrict the caller status of the Cloud Functions deployed. Cloud Functions use service accounts rather than a user account to manage services. In this respect, the service account takes on the role of the user without needing an actual human to be involved in the process.
Concerning the user account, each function deployed will be assigned a service account responsible for permissions. The service account is created either manually or automatically; in both instances, the role and permissions...