Table of Contents - X.1650 (05/2025) - Security guidelines for serverless computing

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Security threats of serverless computing
7.1 Security threats in the access layer
7.2 Security threats in the computing layer
7.3 Security threats in the BaaS layer
8 Security guidelines for serverless computing
8.1 General
8.2 Security guidelines for access layer
8.3 Security guidelines for the computing layer
8.4 Security guidelines for the BaaS layer
Bibliography