Security pillar
The security pillar includes the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
There are five best practice areas for security in the cloud:
Serverless addresses some of today’s biggest security concerns because it removes infrastructure management tasks such as operating system patching and updating binaries. Although the attack surface is reduced compared to non-serverless architectures, the Open Web Application Security Project (OWASP) and application security best practices still apply.
The questions in this section are designed to help you address specific ways an attacker could try to gain access to or exploit misconfigured permissions, which could lead to abuse. The practices described in this section strongly influence the security of your entire cloud platform and so they should be validated carefully and reviewed frequently.
The Incident response category will not be described in this document because the practices from the AWS Well-Architected Framework still apply.