Report StructureEach of the original Top 10 risks is reviewed. The review lists six sections:A. New possible attack vectors when targeting serverless applicationsB. How/Why a serverless application could be vulnerable to such attacksC. What is the business impact on the cloud accountD. Best practices and suggestions for preventing and mitigating such attacksE. Example scenario(s), demonstrating a possible vulnerability and exploitF. Taking into account the attack vectors, weaknesses and impact, as well as the ability to identify andmitigate it; is this security risk higher, lower or the same in serverless applications?