0
0
Cybersecurityknowledge~30 mins

Serverless security considerations in Cybersecurity - Mini Project: Build & Apply

Choose your learning style9 modes available
Serverless Security Considerations
📖 Scenario: You are working in a company that uses serverless computing to run applications. Your team wants to ensure the applications are secure from common risks.
🎯 Goal: Build a checklist of key security considerations for serverless applications to help your team understand and apply best practices.
📋 What You'll Learn
Create a list of common serverless security risks
Add a variable to set a security risk threshold
Use a loop to filter risks above the threshold
Add a final note about continuous monitoring
💡 Why This Matters
🌍 Real World
Serverless computing is popular for building scalable applications without managing servers. Knowing security risks helps protect data and services.
💼 Career
Security analysts and cloud engineers must understand serverless risks to design safe applications and respond to threats effectively.
Progress0 / 4 steps
1
Create a list of serverless security risks
Create a list called security_risks with these exact strings: 'Insecure function permissions', 'Excessive resource access', 'Injection attacks', 'Data exposure', and 'Lack of monitoring'.
Cybersecurity
Need a hint?

Use square brackets to create a list and include all the exact strings separated by commas.

2
Set a risk severity threshold
Create a dictionary called risk_severity that assigns these exact severity scores: 'Insecure function permissions': 8, 'Excessive resource access': 7, 'Injection attacks': 9, 'Data exposure': 6, and 'Lack of monitoring': 5.
Cybersecurity
Need a hint?

Use curly braces to create a dictionary with the exact keys and integer values.

3
Filter high severity risks
Create a list called high_risks that includes only the risks from security_risks whose severity in risk_severity is greater than or equal to 7. Use a for loop with variables risk and check risk_severity[risk].
Cybersecurity
Need a hint?

Use a for loop to check each risk's severity and add it to high_risks if it meets the threshold.

4
Add a final note on monitoring
Create a string variable called final_note with this exact text: 'Continuous monitoring is essential to maintain serverless security.'
Cybersecurity
Need a hint?

Assign the exact text to the variable final_note using quotes.