Managing physical servers will be a thing of the past once you’re able to harness the power of serverless computing. If you’re already prepped with the basics of serverless computing, Serverless Programming Cookbook will help you take the next step ahead. This recipe-based guide provides solutions to problems you might face while building serverless applications.
I was one of the speaker for the Software Architects Meetup at Devon Bangalore on April 13th. I was also the first speaker for the day. Shared a book with another speaker/author at meetup Ganesh Samarthyam. I also gave a copy of my book to the context winner as part of the promo. Read more about the meetup here. Read more about book here.
Following are some of the recommendations available under security for the basic plan: Security Groups - Specific Ports Unrestricted (Alert), Amazon EBS Public Snapshots, Amazon RDS Public Snapshots, Amazon S3 Bucket Permissions, IAM Use, MFA on Root Account etc.
The CIS benchmark controls available under Identity and Access Management ensure the following:
-
Avoid the use of the root account.
-
Multi-Factor authentication (MFA) is enabled for all IAM users that have a console password.
-
Credentials are unused for 90 days or greater are disabled.
-
Access keys are rotated every 90 days or less.