Table of Contents - X.1650 (05/2025) - Security guidelines for serverless computing
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Security threats of serverless computing 7.1 Security threats in the access layer 7.2 Security threats in the computing layer 7.3 Security threats in the BaaS layer 8 Security guidelines for serverless computing 8.1 General 8.2 Security guidelines for access layer 8.3 Security guidelines for the computing layer 8.4 Security guidelines for the BaaS layer Bibliography
|