Scan Serverless Functions
Scanning for Security Threats
Once deployed, Panoptica will scan the configuration of your serverless functions for any potential security threats. The first assessment will be triggered at deployment. Panoptica will continue to monitor the configuration for any changes, and update the threats identified accordingly.
Scanning for Vulnerabilities
Panoptica can also scan the dependencies that your code uses for any vulnerabilities. This feature is only available in AWS at the moment.
You can manually trigger a vulnerability scan at any time by clicking Scan now among the Actions buttons in the last column. You can also schedule scans to be run at regular intervals via the Edit configuration button.
Panoptica can also authenticate the identity of your serverless functions. This feature is only available in AWS at the moment.
Function Validation is initiated by clicking Edit configuration among the Actions buttons in the last column. Select whether you want to use Hash Validation or Signature Validation, and click Finish.
Updated 29 days ago