Introduction to serverless security
As we transition from the concept of microservices, which we discussed in the previous chapter, it is essential to understand that serverless architectures are not just an evolution but a specialized form of microservices. While microservices have their own set of security challenges, serverless introduces a new landscape of security considerations that are both unique and complex. This section aims to delve into these aspects before getting more in-depth into specific areas of serverless security.
What is serverless?
First, let’s demystify things around serverless. Serverless is a cloud computing execution model where cloud providers automatically manage the infrastructure. In serverless computing, developers write code that is executed in response to events, such as HTTP requests, database modifications, or even changes in system state or periodical execution. Behind the scenes, the cloud provider dynamically allocates resources to...