Embedding security into the lambda service offering In the last blog, Threat Modelling — EKS, we saw how to evaluate the security posture of EKS, in this blog, we will do a similar exercise for AWS Lambda. Shared responsibility Model Customer Function code, libraries, extension, layers
Data in cloud
Data in Transit
Resource Configuration
IAM
Other Service configuration…