Download PDFOpen PDF in browserMitigating Attack Surfaces in Serverless Architectures: Best Practices for Secure DeploymentsEasyChair Preprint 158915 pages•Date: March 6, 2025AbstractServerless computing has transformed the way organizations deploy applications, offering greater scalability, cost efficiency, and operational agility. However, the shift to a function-as-a service (FaaS) model introduces new security risks, including misconfigured permissions, insecure dependencies, API vulnerabilities, and difficulties in monitoring short-lived functions. Unlike traditional monolithic architectures, serverless environments rely on event driven execution, which expands the attack surface by increasing the number of exposed interfaces. This article provides a comprehensive analysis of security risks in serverless computing and offers best practices for mitigating attack surfaces. It explores secure dependency management, strong identity and access controls, API security enhancements, real-time monitoring, and compliance considerations. By implementing these strategies, organizations can reduce vulnerabilities, prevent security breaches, and enhance the resilience of their serverless deployments. Keyphrases: API, Cloud, Cloud Computing, Identity and Access Management (IAM), Security, Serverless security, Threat Detection, event-driven security, least privilege, monitoring, native security, secure coding
|