Slide 27
Slide 27 text
THREAT MODELING
▸Do proper Threat Modeling
Data Input, Parsing, Validation, Patterns, Flows,
Transformations, etc.
▸„Legacy“ (Traditional) Security Solutions won’t fit for
serverless applications, as they are deployed to the
infrastructure (which you no longer control)
SERVERLESS SECURITY