This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Identifying unique attack vectors in serverless: function code, dependencies, configurations, triggers, and integrations.
You've completed the free preview. Subscribe to unlock every lesson in every course.