[Infographics 2/2] Securing serverless architectures
From web threats, over IAM principles to auditing and monitoring. Learn more about securing serverless architectures >>
Mariliis Retter
2 years ago | 1 min read
Serverless reduces a lot of operational burdens, but a 𝘀𝗲𝗰𝘂𝗿𝗲 𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 is still your responsibility 🔐
From web threats, over IAM principles to auditing and monitoring.
Learn more about securing serverless architectures in these two-parter infographics:
Further reading:
Securing serverless apps with critical logging
Upvote
Created by
Mariliis Retter
Post
Related Articles