Download PDFOpen PDF in browser

Mitigating Attack Surfaces in Serverless Architectures: Best Practices for Secure Deployments

EasyChair Preprint 15891

5 pagesDate: March 6, 2025

Abstract

Serverless computing has transformed the way organizations deploy applications, offering greater scalability, cost efficiency, and operational agility. However, the shift to a function-as-a service (FaaS) model introduces new security risks, including misconfigured permissions, insecure dependencies, API vulnerabilities, and difficulties in monitoring short-lived functions. Unlike traditional monolithic architectures, serverless environments rely on event driven execution, which expands the attack surface by increasing the number of exposed interfaces. This article provides a comprehensive analysis of security risks in serverless computing and offers best practices for mitigating attack surfaces. It explores secure dependency management, strong identity and access controls, API security enhancements, real-time monitoring, and compliance considerations. By implementing these strategies, organizations can reduce vulnerabilities, prevent security breaches, and enhance the resilience of their serverless deployments.

Keyphrases: API, Cloud, Cloud Computing, Identity and Access Management (IAM), Security, Serverless security, Threat Detection, event-driven security, least privilege, monitoring, native security, secure coding

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@booklet{EasyChair:15891,
  author    = {Kenny Awkent},
  title     = {Mitigating Attack Surfaces in Serverless Architectures: Best  Practices for Secure Deployments},
  howpublished = {EasyChair Preprint 15891},
  year      = {EasyChair, 2025}}
Download PDFOpen PDF in browser