0
0
Cybersecurityknowledge~10 mins

Serverless security considerations in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to identify a key security concern in serverless computing.

Cybersecurity
One major security concern in serverless is [1] due to the shared environment.
Drag options to blanks, or click blank then click option'
Anetwork speed
Bdata isolation
Chardware failure
Duser interface
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing network speed with security
Thinking hardware failure is the main concern in serverless
2fill in blank
medium

Complete the sentence to explain a security best practice for serverless functions.

Cybersecurity
To reduce risk, serverless functions should have [1] permissions following the principle of least privilege.
Drag options to blanks, or click blank then click option'
Amaximum
Bshared
Cminimal
Ddefault
Attempts:
3 left
💡 Hint
Common Mistakes
Assuming maximum permissions improve security
Using default permissions without review
3fill in blank
hard

Fix the error in the security practice described below.

Cybersecurity
Serverless functions should avoid [1] to prevent unauthorized access to resources.
Drag options to blanks, or click blank then click option'
Aencrypting data
Busing environment variables
Clogging errors
Dhardcoding credentials
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing environment variables with hardcoding
Thinking logging errors is a security risk in this context
4fill in blank
hard

Fill both blanks to complete the security measure for serverless functions.

Cybersecurity
Implement [1] to monitor function activity and use [2] to control access based on user identity.
Drag options to blanks, or click blank then click option'
Alogging
Bfirewalls
Cidentity and access management
Dcaching
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up firewalls with IAM
Choosing caching instead of logging
5fill in blank
hard

Fill all three blanks to complete the serverless security best practices.

Cybersecurity
Use [1] to protect data in transit, [2] to secure stored secrets, and [3] to limit function execution time.
Drag options to blanks, or click blank then click option'
Aencryption
Bsecret managers
Ctimeouts
Dload balancers
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing load balancers with security controls
Not using secret managers for credentials