Complete the sentence to identify a key security concern in serverless computing.
One major security concern in serverless is [1] due to the shared environment.
Data isolation is critical because serverless functions run in shared environments, so isolating data prevents leaks between users.
Complete the sentence to explain a security best practice for serverless functions.
To reduce risk, serverless functions should have [1] permissions following the principle of least privilege.Minimal permissions ensure functions only access what they need, reducing potential damage if compromised.
Fix the error in the security practice described below.
Serverless functions should avoid [1] to prevent unauthorized access to resources.Hardcoding credentials in code is risky because it can expose secrets if the code is accessed. Using environment variables or secret managers is safer.
Fill both blanks to complete the security measure for serverless functions.
Implement [1] to monitor function activity and use [2] to control access based on user identity.
Logging helps track what functions do, and identity and access management (IAM) controls who can use or invoke functions.
Fill all three blanks to complete the serverless security best practices.
Use [1] to protect data in transit, [2] to secure stored secrets, and [3] to limit function execution time.
Encryption protects data moving between systems, secret managers keep credentials safe, and timeouts prevent functions from running too long and causing issues.