Serverless Security
Serverless security refers to the practices and technologies used to protect applications built on serverless computing architectures, where the underlying infrastructure is managed by a cloud provider rather than the application team. Because developers do not manage servers directly, the security responsibilities shift toward application code, function configurations, permissions, and event triggers. This requires a different approach than traditional infrastructure security.
Serverless security is the set of practices, controls, and technologies applied to protect serverless computing environments, typically involving Function-as-a-Service (FaaS) platforms where cloud providers manage infrastructure provisioning and scaling. The security model shifts shared responsibility boundaries such that the provider handles host-level and hypervisor-level controls, while practitioners retain responsibility for application code vulnerabilities, function-level identity and access management (IAM) permissions, event source configurations, dependency risks in function packages, and data handling within function execution contexts. Security controls typically address static analysis of function code and dependencies, least-privilege enforcement on execution roles, securing event triggers and API integrations, and runtime monitoring of function behavior. Because serverless functions are ephemeral and lack persistent infrastructure, certain traditional controls such as host-based intrusion detection and network-level segmentation may apply differently or require cloud-native alternatives.
Why it matters
Serverless architectures fundamentally alter the attack surface of cloud-hosted applications. Because infrastructure management is delegated to the cloud provider, the risks that remain under practitioner control are concentrated in application code, dependency packages, IAM configurations, and event source integrations. Misconfigurations in any of these areas, such as overly permissive execution roles or improperly secured event triggers, can expose sensitive data or allow unauthorized function invocations without requiring an attacker to compromise underlying infrastructure.
Who it's relevant to
Inside Serverless Security
Common questions
Answers to the questions practitioners most commonly ask about Serverless Security.