From the course: Serverless Architecture
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Review serverless security patterns - Amazon Web Services (AWS) Tutorial
From the course: Serverless Architecture
Review serverless security patterns
- [Instructor] Security best practices start with baselines. You want to set IAM, or Identity and Access Management, user cloud accounts per policy. You want to have minimal permissions that are role based. So the group, the work group, that a person belongs to. And you want to avoid star, which means all. So for example, if you're assigning to cloud storage in Google, don't assign cloud storage to all buckets, specify the individual bucket names. You want to have unique user account credentials, shouldn't have anybody sharing, and multifactor authentication as a baseline for all accounts. You want to reduce the attack surface. So you want to only enable the cloud services in production accounts that you need for your serverless architectures. In other words, if you don't need virtual machines, turn off that service. You want to test external connections. And you want to have granular service policies, again, avoiding…
Contents
-
-
-
Understand serverless architecture concepts4m 36s
-
(Locked)
Review example serverless architectures4m 24s
-
(Locked)
Select best fit serverless use cases6m 51s
-
(Locked)
Control costs using serverless9m 15s
-
(Locked)
Understand risks of serverless4m 10s
-
(Locked)
Review serverless security patterns4m
-
-
-
-
-