The document is curated and maintained by top industry practitioners and security researchers with vast experience in application security, cloud and serverless architectures.
As many organizations are still exploring serverless architectures, or just making their first steps in the serverless world, we believe that this guide is critical for their success in building robust, secure and reliable applications.