In this chapter, we will learn how to perform a risk assessment for a serverless application. We will explore how to understand how the application works, which includes reviewing documentation, source code, and system accounts and using the application. We will discuss why we scope the risk assessment. We will learn how to develop a threat model and how to use it to start creating the risk assessment.
Conventions
We will review the conventions used throughout this book. For clarity, we will use one example application throughout. We might deviate from this example application at ...