From the course: Serverless Architecture

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Review serverless security patterns

Review serverless security patterns - Amazon Web Services (AWS) Tutorial

From the course: Serverless Architecture

Review serverless security patterns

- [Instructor] Security best practices start with baselines. You want to set IAM, or Identity and Access Management, user cloud accounts per policy. You want to have minimal permissions that are role based. So the group, the work group, that a person belongs to. And you want to avoid star, which means all. So for example, if you're assigning to cloud storage in Google, don't assign cloud storage to all buckets, specify the individual bucket names. You want to have unique user account credentials, shouldn't have anybody sharing, and multifactor authentication as a baseline for all accounts. You want to reduce the attack surface. So you want to only enable the cloud services in production accounts that you need for your serverless architectures. In other words, if you don't need virtual machines, turn off that service. You want to test external connections. And you want to have granular service policies, again, avoiding…

Contents