1. https://www.owasp.org/images/5/5c/OWASP-Top-10-Serverless-Interpretation-en.pdf
    07-03-2019

    OWASP Serverless Top 10. When adopting serverless technology, we eliminate the need to develop a server to manage our application. By doing so, we also pass some of the security threats to the infrastructure provider. these applications are running without a managed server, they still execute code. If this code is written in an insecure manner, it can still be vulnerable to application-level attacks. This report will examine the differences in attack vectors, security weaknesses, and the business impact of application attacks on in the serverless world, and, most importantly, the report will suggest ways to to prevent them.

  2. https://paragonie.com/blog/2017/12/2018-guide-building-secure-php-software
    07-03-2019

    this seems to be a pretty comprehensive guild on how to solidify security around a PHP application. And with most things tech, the ideas presented here are applicable to many langs

  3. https://simplesecurity.sensedeep.com/web-developer-security-checklist-f2e4f43c9c56
    07-03-2019