- Access Control
Vulnerabilities and precautions for using Cloud Functions.
We'll cover the following...
Security
The Cloud Functions we introduced in this chapter are open to the web, which means that anyone can access them and potentially abuse the endpoints.
In general, it’s best not to enable unauthenticated access and instead lock down the function so that only authenticated users and services can access them. This ...