ChaptersEventsBlog

Download Publication

How to Design a Secure Serverless Architecture
How to Design a Secure Serverless Architecture
Who it's for:
  • Application Developers  
  • Security Professionals  
  • CISOs  
  • System and Security
    Administrators  
  • Information System Security 
    Officers

How to Design a Secure Serverless Architecture

Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable developers to develop and deploy faster, allowing an easy way to move to cloud-native services without managing infrastructures like container clusters or virtual machines. However, like any solution, serverless computing brings with it a variety of cyber risks. 

This publication provides best practices and recommendations for securing serverless architectures. It offers an extensive overview of the different threats, focusing on the application owner risks that serverless platforms are exposed to and suggesting the appropriate security controls. This 2023 version provides an update to the original document published in 2021. The update includes new recommendations to secure workloads utilizing a serverless solution.

Key Takeaways: 
  • What is serverless
  • The advantages and benefits of serverless architectures
  • What is the shared responsibility model for serverless
  • Secure serverless design considerations, controls, and best practices
  • Kubernetes security best practices 
  • Compliance and governance best practices for serverless
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
SASE: Securing the New Enterprise Perimeter with Zero Trust
SASE: Securing the New Enterprise Perimeter with Zero Trust
Published: 10/27/2025
What Is Model Context Protocol (MCP)?
What Is Model Context Protocol (MCP)?
Published: 10/15/2025
From Automation to Augmentation: The Future of SOCs in Enterprise Cybersecurity
From Automation to Augmentation: The Future of SOCs in Enterprise C...
Published: 10/09/2025
Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust
Published: 08/29/2025

Interested in helping develop research with CSA?

Related Certificates & Training