Security Overview of AWS Lambda AWS Whitepaper
(paid link) As an Amazon Associate I earn from qualifying purchases.
This whitepaper presents a deep dive of the AWS Lambda service through a security lens.
It provides a well-rounded picture of the service, which is useful for new adopters, and deepens understanding of Lambda for current users.
The intended audience for this whitepaper is Chief Information Security Officers (CISOs), information security engineers, enterprise architects, compliance teams, and any others interested in understanding the underpinnings of AWS Lambda.
Today, more workloads are using AWS Lambda to achieve scalability, performance, and cost efficiency, without managing the underlying infrastructure.
These workloads scale to thousands of concurrent requests per second.
Lambda one of the many important services that is offered by AWS today.
Lambda is used by hundreds of thousands of Amazon Web Services (AWS) customers to serve trillions of requests every month.
Lambda is suitable for mission critical applications in many industries.
A broad variety of customers, from media and entertainment to financial services and other regulated industries, take advantage of Lambda.
These customers decrease time to market, optimize costs, and improve agility by focusing on what they do best: running their business.
The managed runtime environment model enables Lambda to manage much of the implementation details of running serverless workloads.
This model further reduces the attack surface while making cloud security simpler.
This whitepaper presents the underpinnings of that model, along with best practices, to developers, security analysts, security and compliance teams, and other stakeholders.
00:01:56 About AWS Lambda
00:03:32 Benefits of Lambda
00:05:54 Cost for running Lambda-based applications
00:06:20 The Shared Responsibility Model
00:07:00 Lambda Functions and Layers
00:08:23 Lambda Invoke Modes
00:11:40 Lambda Executions
00:13:03 Lambda execution environments
00:17:14 Lambda MicroVMs and Workers
00:20:15 Lambda Isolation Technologies
00:22:07 Storage and state
00:24:29 Runtime Maintenance in Lambda
00:27:00 Monitoring and Auditing Lambda Functions
00:29:16 Architecting and Operating Lambda Functions
00:30:41 Lambda and Compliance
00:31:55 Lambda Event Sources