paint-brush
Securing Serverless Applications with Critical Loggingby@taavi-rehemagi
164 reads

Securing Serverless Applications with Critical Logging

by Taavi Rehemägi7mAugust 27th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Serverless architecture has some clear advantages over its traditional counterpart, but serverless has some security disadvantages. Logging is critical for logging in to a serverless app, says Dashbird CEO. It's not an exhaustive list but will give us a good head start. Logging critical logs will help us understand which serverless security flaws attackers explored and how to fix them, or build a block list of IP addresses, or identify compromised customer accounts. It will buy us precious time and provide valuable insights that may save a lot of money -- and, most importantly, our hard-earned reputation!

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Securing Serverless Applications with Critical Logging
Taavi Rehemägi HackerNoon profile picture
Taavi Rehemägi

Taavi Rehemägi

@taavi-rehemagi

CEO of Dashbird. 13y experience as a software developer & 5y of building Serverless applications.

Learn More
LEARN MORE ABOUT @TAAVI-REHEMAGI'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Taavi Rehemägi HackerNoon profile picture
Taavi Rehemägi@taavi-rehemagi
CEO of Dashbird. 13y experience as a software developer & 5y of building Serverless applications.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Newsbreak
Learnrepo
Coffee-web