Skip to content

Learning Serverless Security

Joshua Arvina Lat

Hacking and Securing Serverless Cloud Applications on AWS, Azure, and GCP

Barcode 9781098149017
Paperback

Original price £51.79 - Original price £51.79
Original price
£51.79
£51.79 - £51.79
Current price £51.79

Click here to join our rewards scheme and earn points on this purchase!

Availability:
in stock
FREE shipping

Release Date: 06/03/2026

Genre: Computing & The Internet
Sub-Genre: Applications & Software
Label: O'Reilly Media
Language: English
Publisher: O'Reilly Media

Hacking and Securing Serverless Cloud Applications on AWS, Azure, and GCP
This practical guide covers the relevant offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll learn how to attack and defend a variety of vulnerable serverless applications using the step-by-step instructions.

Serverless computing now serves as a strategic backbone of modern cloud architectures, helping teams move faster and operate at scale. However, many still struggle to understand the security model of serverless computing. As more organizations migrate critical systems and sensitive data to the cloud using serverless architectures, this gap in serverless security knowledge increasingly exposes them to serious security incidents and data breaches.This practical guide covers offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll explore how to attack and defend vulnerable serverless applications using step-by-step instructions. By the end of this book, you'll understand how to prevent various serverless application attacks and privilege escalation techniques.

Author Joshua Arvin Lat, chief technology officer at NuWorks Interactive Labs and an AWS AI Hero, shows you how to:

  • Identify and address vulnerabilities within modern serverless applications
  • Dive deeper into serverless security risks and threats
  • Explore privilege escalation techniques in vulnerable-by-design serverless lab environments
  • Configure authentication and identity services properly on AWS, Azure, and Google Cloud
  • Implement security strategies and best practices to prevent serverless application attacks
  • Audit serverless function code using security tools and strategies