cft

[Infographics 2/2] Securing serverless architectures

From web threats, over IAM principles to auditing and monitoring. Learn more about securing serverless architectures >>


user

Mariliis Retter

2 years ago | 1 min read

Serverless reduces a lot of operational burdens, but a 𝘀𝗲𝗰𝘂𝗿𝗲 𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 is still your responsibility 🔐

From web threats, over IAM principles to auditing and monitoring.

Learn more about securing serverless architectures in these two-parter infographics:


Further reading:

Securing serverless apps with critical logging

AWS Well-Architected Framework in Serverless: Security

Mastering AWS identity and access management

Upvote


user
Created by

Mariliis Retter


people
Post

Upvote

Downvote

Comment

Bookmark

Share


Related Articles