Miguel's Blog · Serverless · Security

Miguel's Blog · Serverless · Security

5 Serverless Security Open-Source Tools You Should Use

5 Serverless Security Open-Source Tools You Should Use

There are some wonderful free or open-source tools you can use to improve the security of your serverless projects. We will explore these tools in five areas.

1. Linters

Linters help improve your code by finding common coding flaws. You would typically run them when you create a pull request, create a build, or in your CI/CD.

2. Dependency checkers

Your project might use dependencies, libraries, or packages. Some of these packages might be out-of-date, deprecated, or have known vulnerabilities. A dependency checker can help you find packages that need updating and create pull requests to update them automatically.

3. AWS IAM Roles

If you are using Amazon Web Services, your projects has IAM roles for your serverless functions. The Serverless Framework automatically creates one IAM role for all the functions in your configuration file. Each function should have its own IAM role to enable the Principle of Least Privilege.

4. Error Monitoring and Alerting

Your functions may throw an error, but you may not know about it unless you manually monitor the logs or you setup an alerting system.

5. Termination Protection

When you deploy a new AWS CloudFormation stack to production, you might want to enable termination protection to avoid accidentally deleting your stack.

Conclusion

You can improve the security of your serverless project by taking advantage of free or open source solutions that are already out there.

Before You Go

Join my mailing list to receive updates about my writing.

Visit miguelacallesmba.com/subscribe and sign up.

Stay secure,
Miguel

About the Author

Miguel is a Principal Security Engineer and is the author of the " Serverless Security " book. He has worked on multiple serverless projects as a developer and security engineer, contributed to open-source serverless projects, and worked on large military systems in various engineering roles.


Originally published on Secjuice.com

Photo by Patrick Hendry on Unsplash

Proudly part of