Recall & Review
beginner
What is a key security challenge unique to serverless computing?
A key challenge is managing the increased attack surface due to many small, event-driven functions that can be triggered independently.
Click to reveal answer
beginner
Why is least privilege important in serverless security?
Least privilege means giving functions only the permissions they need, reducing risk if a function is compromised.
Click to reveal answer
intermediate
How can environment variables pose a security risk in serverless functions?
If sensitive data like API keys are stored in environment variables without encryption, they can be exposed if the function environment is accessed improperly.
Click to reveal answer
intermediate
What role does monitoring and logging play in serverless security?
Monitoring and logging help detect unusual activity or attacks quickly, which is critical since serverless functions are short-lived and distributed.
Click to reveal answer
beginner
How does the shared responsibility model affect serverless security?
Cloud providers secure the infrastructure, but users must secure their code, configurations, and data access controls.
Click to reveal answer
What is a common way to reduce risk in serverless functions?
✗ Incorrect
Using least privilege access controls limits what each function can do, reducing potential damage if compromised.
Why is monitoring important in serverless environments?
✗ Incorrect
Functions are short-lived and run in many places, so monitoring helps detect issues quickly.
Who is responsible for securing the serverless infrastructure?
✗ Incorrect
Cloud providers secure the underlying infrastructure; users secure their code and configurations.
What risk comes from storing secrets in environment variables without encryption?
✗ Incorrect
Unencrypted secrets can be exposed if someone gains access to the function environment.
What increases the attack surface in serverless computing?
✗ Incorrect
Many small functions increase points where attackers can try to exploit vulnerabilities.
Explain the shared responsibility model in serverless security and what users must do to protect their applications.
Think about who handles what in cloud security.
You got /4 concepts.
Describe why monitoring and logging are critical in serverless environments and how they help improve security.
Consider the nature of serverless functions and how to spot problems.
You got /4 concepts.