This course will get you started on thinking about how security best practices should be reflected in serverless architectures. It covers some of the key Amazon Web Services (AWS) offerings that are available to help you monitor for issues and audit your serverless applications. In this course, you will learn about your responsibilities related to securing your applications. You will learn about the ways in which you can use AWS CloudTrail, Amazon CloudWatch, AWS Config, and AWS X-Ray to monitor and respond to anomalies and changes in your serverless architecture.
- Course level: Intermediate
- Duration: 1.5 hours
Activities
This course includes presentations, videos, and assessments.
Course objectives
In this course, you will learn to:
- Summarize your responsibilities related to securing your applications
- Describe the ways in which AWS creates isolation between functions and between micro-virtual machines (microVMs)
- List best practices for infrastructure protection and network boundaries for components that your serverless architecture might interact with
- List best practices for validating input and protecting data at rest and in transit in a serverless, API-based architecture
- Summarize the types of CloudWatch alarms that you should implement for managing your serverless applications
- List key considerations for logging with AWS Lambda and Amazon API Gateway, both in terms of what to capture, and what to avoid
- Compare the ways in which you can use CloudTrail, AWS Config, and X-Ray to monitor and respond to anomalies and changes in your serverless architecture
Intended audience
This course is intended for:
- Experienced developers and cloud architects who are familiar with the AWS Cloud and serverless technologies.
Prerequisites
We recommend that attendees of this course have:
- Familiarity with serverless technologies and AWS Cloud concepts
- Completion of Architecting on AWS or equivalent knowledge
- Completion of Getting into the Serverless Mindset or equivalent knowledge
- Completion of Introduction to Serverless Development or equivalent knowledge
- Completion of AWS Lambda Foundations or equivalent knowledge
Â
Course outline
Module 1: Introduction
- How to Use This Course
- Course Introduction
Module 2: Security and Observability for Serverless Applications
- Securing Serverless Architectures
- Observability for Serverless Applications
Module 3: Wrap-Up
- Wrap-Up and Next Steps
- Knowledge Check
- Feedback