0
0
Cybersecurityknowledge~5 mins

Serverless security considerations in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a key security challenge unique to serverless computing?
A key challenge is managing the increased attack surface due to many small, event-driven functions that can be triggered independently.
Click to reveal answer
beginner
Why is least privilege important in serverless security?
Least privilege means giving functions only the permissions they need, reducing risk if a function is compromised.
Click to reveal answer
intermediate
How can environment variables pose a security risk in serverless functions?
If sensitive data like API keys are stored in environment variables without encryption, they can be exposed if the function environment is accessed improperly.
Click to reveal answer
intermediate
What role does monitoring and logging play in serverless security?
Monitoring and logging help detect unusual activity or attacks quickly, which is critical since serverless functions are short-lived and distributed.
Click to reveal answer
beginner
How does the shared responsibility model affect serverless security?
Cloud providers secure the infrastructure, but users must secure their code, configurations, and data access controls.
Click to reveal answer
What is a common way to reduce risk in serverless functions?
AUsing least privilege access controls
BGranting all permissions to every function
CDisabling logging to improve speed
DStoring secrets in plain text environment variables
Why is monitoring important in serverless environments?
ABecause functions run for a long time
BBecause functions are short-lived and distributed
CBecause serverless eliminates all security risks
DBecause monitoring slows down functions
Who is responsible for securing the serverless infrastructure?
AThird-party vendors only
BThe user only
CNo one
DThe cloud provider
What risk comes from storing secrets in environment variables without encryption?
AExposure of sensitive data if accessed improperly
BNo risk at all
CImproved security
DFaster function execution
What increases the attack surface in serverless computing?
AUsing a single large server
BDisabling all network access
CHaving many small, independent functions
DNot using any cloud services
Explain the shared responsibility model in serverless security and what users must do to protect their applications.
Think about who handles what in cloud security.
You got /4 concepts.
    Describe why monitoring and logging are critical in serverless environments and how they help improve security.
    Consider the nature of serverless functions and how to spot problems.
    You got /4 concepts.