1. In a serverless cloud architecture, what’s a key additional security concern compared to traditional server-based models?
Serverless functions run in highly ephemeral environments and often execute with privileges assigned to the function role. Because they are event-triggered, run in managed infrastructure and can scale rapidly, controlling invocation context and permissions becomes critical. Misconfiguration can lead to unauthorized execution or data access. Advanced cloud-security interview guides emphasise function permissions, invocation sources, context awareness and least‐privilege in serverless. :contentReference[oaicite:2]{index=2}